Edit tour

Windows Analysis Report
https://downloads.sabrent.com/product/hb-b7c3-firmware-update

Overview

General Information

Sample URL:https://downloads.sabrent.com/product/hb-b7c3-firmware-update
Analysis ID:1384873
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Machine Learning detection for dropped file
Sample is not signed and drops a device driver
Uses dynamic DNS services
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses insecure TLS / SSL version for HTTPS connection

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 5616 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://downloads.sabrent.com/product/hb-b7c3-firmware-update MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 5964 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1892,i,16834710871027191727,13181455178079285292,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • OpenWith.exe (PID: 3448 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • svchost.exe (PID: 6336 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • rundll32.exe (PID: 6988 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • 7zG.exe (PID: 6368 cmdline: "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Downloads\HB-B7C3 upgrade software\" -spe -an -ai#7zMap24121:108:7zEvent24953 MD5: 50F289DF0C19484E970849AAC4E6F977)
  • RHC.exe (PID: 3468 cmdline: "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe" MD5: 9BD61BF5EBF851EA7815B6358CFBDCE0)
    • ._cache_RHC.exe (PID: 7128 cmdline: "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe" MD5: 2C3251B9881C1F5D2E90B0D506BB3B0F)
    • ._cache_RHC.exe (PID: 5428 cmdline: "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe" MD5: 2C3251B9881C1F5D2E90B0D506BB3B0F)
    • Synaptics.exe (PID: 6352 cmdline: "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate MD5: 84768A60EDD32D454245C2A26D2D5FA6)
      • WerFault.exe (PID: 3756 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 4084 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • EXCEL.EXE (PID: 2224 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: 4A871771235598812032C822E6F68F19)
  • svchost.exe (PID: 2808 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 3788 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 6772 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6352 -ip 6352 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\ProgramData\Synaptics\RCX589E.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\ProgramData\Synaptics\RCX589E.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0000000C.00000000.2417252113.0000000000401000.00000020.00000001.01000000.00000009.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\Synaptics\Synaptics.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, ProcessId: 3468, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver
              Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\ProgramData\Synaptics\Synaptics.exe, ProcessId: 6352, TargetFilename: C:\Users\user\AppData\Local\Temp\VYxkRyu2.xlsm
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt, CommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt, ProcessId: 6336, ProcessName: svchost.exe
              Timestamp:192.168.2.16174.128.246.10049790802832617 02/01/24-13:51:05.507428
              SID:2832617
              Source Port:49790
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\ProgramData\Synaptics\RCX589E.tmpAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: TR/Dldr.Agent.SH
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeAvira: detection malicious, Label: W2000M/Dldr.Agent.17651006
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeReversingLabs: Detection: 89%
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeVirustotal: Detection: 90%Perma Link
              Source: C:\ProgramData\Synaptics\RCX589E.tmpReversingLabs: Detection: 91%
              Source: C:\ProgramData\Synaptics\RCX589E.tmpVirustotal: Detection: 91%Perma Link
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJoe Sandbox ML: detected
              Source: https://downloads.sabrent.com/product/hb-b7c3-firmware-update/HTTP Parser: No favicon
              Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49775 version: TLS 1.0
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dll
              Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49773 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49776 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49782 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49783 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 64.233.177.132:443 -> 192.168.2.16:49787 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 64.233.177.132:443 -> 192.168.2.16:49786 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49789 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49791 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49824 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49825 version: TLS 1.2
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
              Source: excel.exeMemory has grown: Private usage: 1MB later: 68MB

              Networking

              barindex
              Source: TrafficSnort IDS: 2832617 ETPRO TROJAN W32.Bloat-A Checkin 192.168.2.16:49790 -> 174.128.246.100:80
              Source: unknownDNS query: name: freedns.afraid.org
              Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49775 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
              Source: unknownTCP traffic detected without corresponding DNS query: 72.21.81.240
              Source: unknownTCP traffic detected without corresponding DNS query: 72.21.81.240
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
              Source: global trafficHTTP traffic detected: GET /api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978 HTTP/1.1User-Agent: MyAppHost: freedns.afraid.orgCache-Control: no-cache
              Source: unknownDNS traffic detected: queries for: downloads.sabrent.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
              Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
              Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
              Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
              Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
              Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
              Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
              Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
              Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
              Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
              Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
              Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
              Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
              Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
              Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
              Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
              Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
              Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
              Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
              Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
              Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.16:49773 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49776 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49782 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49783 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 64.233.177.132:443 -> 192.168.2.16:49787 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 64.233.177.132:443 -> 192.168.2.16:49786 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49789 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49791 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49824 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.138:443 -> 192.168.2.16:49825 version: TLS 1.2
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Users\user\AppData\Local\Temp\RtsUpx_s.sys
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Windows\system32\drivers\RtsUpx.sys
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Windows\system32\drivers\RtsUpx.sys
              Source: C:\ProgramData\Synaptics\Synaptics.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 4084
              Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: appxdeploymentclient.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dll
              Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: kernel.appcore.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: uxtheme.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: cryptbase.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: explorerframe.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: textshaping.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: textinputframework.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: coreuicomponents.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: coremessaging.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: ntmarta.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: coremessaging.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dll
              Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: wintypes.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: appresolver.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: bcp47langs.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: slc.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: userenv.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: sppc.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: mpr.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: pcacli.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: sfc_os.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: ntmarta.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: twext.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: policymanager.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: msvcp110_win.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: ntshrui.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: windows.fileexplorer.common.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: cscapi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: twinapi.appcore.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: starttiledata.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: acppage.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: sfc.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: msi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: aepic.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: apphelp.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: version.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: msimg32.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: oledlg.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: oleacc.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: winmm.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: riched32.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: riched20.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: usp10.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: msls31.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: wldp.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: textshaping.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: dataexchange.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: d3d11.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: dcomp.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: dxgi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: twinapi.appcore.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: textinputframework.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: coreuicomponents.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: coremessaging.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: ntmarta.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: wintypes.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: wintypes.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: wintypes.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: hid.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: devobj.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: msasn1.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: wbemcomn.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: amsi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: userenv.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: profapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: apphelp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: version.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: wininet.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: wsock32.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: netapi32.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: wldp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: textshaping.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: profapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: propsys.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: iertutil.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: sspicli.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: winhttp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: iphlpapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: mswsock.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: winnsi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: urlmon.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: srvcli.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: netutils.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: dnsapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: rasadhlp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: fwpuclnt.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: schannel.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: mskeyprotect.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: ntasn1.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: dpapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: cryptsp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: rsaenh.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: cryptbase.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: gpapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: ncrypt.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: ncryptsslp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: napinsp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: pnrpnsp.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: wshbth.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: nlaapi.dll
              Source: C:\ProgramData\Synaptics\Synaptics.exeSection loaded: winrnr.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wlidsvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: gamestreamingext.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msauserext.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: elscore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: elstrans.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptngc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: dui70.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: duser.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: dwmapi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: edputil.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: explorerframe.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windowscodecs.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: thumbcache.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: policymanager.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: msvcp110_win.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: msftedit.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windows.globalization.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: bcp47langs.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: bcp47mrm.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: globinputhost.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: assignedaccessruntime.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: propsys.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: xmllite.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windows.fileexplorer.common.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: linkinfo.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: structuredquery.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: atlthunk.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: iertutil.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: windows.storage.search.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: iconcodecservice.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: twinapi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: ntshrui.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: sspicli.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: srvcli.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: cscapi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: actxprxy.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: networkexplorer.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: cldapi.dll
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeSection loaded: fltlib.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: classification engineClassification label: mal76.troj.win@32/97@27/117
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex_HubDevUI
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6352
              Source: C:\ProgramData\Synaptics\Synaptics.exeMutant created: \Sessions\1\BaseNamedObjects\Synaptics2X
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeMutant created: \Sessions\1\BaseNamedObjects\RefCountMutex_2021_07_08
              Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3448:120:WilError_03
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Users\user\AppData\Local\Temp\AFX31DF518A.tmp
              Source: Yara matchFile source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, type: DROPPED
              Source: Yara matchFile source: 0000000C.00000000.2417252113.0000000000401000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\Synaptics\RCX589E.tmp, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\Synaptics\RCX589E.tmp, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\Synaptics\RCX589E.tmp, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, type: DROPPED
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeKey opened: Software\Borland\Delphi\Locales
              Source: C:\ProgramData\Synaptics\Synaptics.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Windows\System32\OpenWith.exeFile read: C:\Users\desktop.ini
              Source: C:\Windows\System32\OpenWith.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://downloads.sabrent.com/product/hb-b7c3-firmware-update
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1892,i,16834710871027191727,13181455178079285292,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
              Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              Source: unknownProcess created: C:\Program Files\7-Zip\7zG.exe "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Downloads\HB-B7C3 upgrade software\" -spe -an -ai#7zMap24121:108:7zEvent24953
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1892,i,16834710871027191727,13181455178079285292,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: unknownProcess created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe"
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe"
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe"
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess created: C:\ProgramData\Synaptics\Synaptics.exe "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
              Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s AppMgmt
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe"
              Source: C:\ProgramData\Synaptics\Synaptics.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 4084
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6352 -ip 6352
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6352 -ip 6352
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 4084
              Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
              Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
              Source: C:\Program Files\7-Zip\7zG.exeFile written: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\config.ini
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLL
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeWindow detected: Number of UI elements: 69
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeWindow detected: Number of UI elements: 13
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeWindow detected: Number of UI elements: 69
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeWindow detected: Number of UI elements: 13
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dll

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Users\user\AppData\Local\Temp\RtsUpx_s.sys
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Users\user\AppData\Local\Temp\RtsUpx_n.sys
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Windows\system32\drivers\RtsUpx.sys
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeFile created: C:\Users\user\AppData\Local\Temp\RtsUpx_n.sysJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsCRLib.dllJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHublib.dllJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJump to dropped file
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile created: C:\ProgramData\Synaptics\RCX589E.tmpJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsDummy.dllJump to dropped file
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile created: C:\ProgramData\Synaptics\RCX589E.tmpJump to dropped file
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
              Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Synaptics Pointing Device Driver
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Synaptics Pointing Device Driver
              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeWindow / User API: threadDelayed 861
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RtsUpx_n.sysJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeDropped PE file which has not been started: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeDropped PE file which has not been started: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsCRLib.dllJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeDropped PE file which has not been started: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHublib.dllJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeDropped PE file which has not been started: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeJump to dropped file
              Source: C:\Program Files\7-Zip\7zG.exeDropped PE file which has not been started: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsDummy.dllJump to dropped file
              Source: C:\ProgramData\Synaptics\Synaptics.exe TID: 2596Thread sleep time: -240000s >= -30000s
              Source: C:\ProgramData\Synaptics\Synaptics.exe TID: 4876Thread sleep time: -60000s >= -30000s
              Source: C:\ProgramData\Synaptics\Synaptics.exe TID: 6416Thread sleep time: -420000s >= -30000s
              Source: C:\ProgramData\Synaptics\Synaptics.exe TID: 2320Thread sleep time: -60000s >= -30000s
              Source: C:\ProgramData\Synaptics\Synaptics.exeThread delayed: delay time: 60000
              Source: C:\ProgramData\Synaptics\Synaptics.exeThread delayed: delay time: 60000
              Source: C:\ProgramData\Synaptics\Synaptics.exeThread delayed: delay time: 60000
              Source: C:\ProgramData\Synaptics\Synaptics.exeThread delayed: delay time: 60000
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer
              Source: C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformation
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeSystem information queried: KernelDebuggerInformation
              Source: C:\ProgramData\Synaptics\Synaptics.exeProcess queried: DebugPort
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeProcess created: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe "C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6352 -ip 6352
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6352 -s 4084
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
              Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\ProgramData\Synaptics\Synaptics.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeDirectory queried: C:\Users\user\Documents
              Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exeDirectory queried: C:\Users\user\Documents\LIJDSFKJZG
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              Windows Service
              1
              Windows Service
              21
              Masquerading
              OS Credential Dumping12
              Security Software Discovery
              Remote Services1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job11
              Registry Run Keys / Startup Folder
              11
              Process Injection
              31
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              11
              Registry Run Keys / Startup Folder
              11
              Process Injection
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              1
              Rundll32
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
              Extra Window Memory Injection
              1
              DLL Side-Loading
              LSA Secrets13
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Extra Window Memory Injection
              Cached Domain Credentials23
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              No bigger version

              windows-stand
              SourceDetectionScannerLabelLink
              https://downloads.sabrent.com/product/hb-b7c3-firmware-update0%Avira URL Cloudsafe
              SourceDetectionScannerLabelLink
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraTR/Dldr.Agent.SH
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraW2000M/Dldr.Agent.17651006
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%Joe Sandbox ML
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe0%ReversingLabs
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe0%VirustotalBrowse
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe89%ReversingLabsWin32.Worm.Zorex
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe90%VirustotalBrowse
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHublib.dll0%ReversingLabs
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHublib.dll0%VirustotalBrowse
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsCRLib.dll0%ReversingLabs
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsCRLib.dll0%VirustotalBrowse
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsDummy.dll0%ReversingLabs
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RsDummy.dll0%VirustotalBrowse
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraTR/Dldr.Agent.SH
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraW2000M/Dldr.Agent.17651006
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraTR/Dldr.Agent.SH
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraW2000M/Dldr.Agent.17651006
              C:\ProgramData\Synaptics\RCX589E.tmp100%Joe Sandbox ML
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%Joe Sandbox ML
              C:\ProgramData\Synaptics\RCX589E.tmp92%ReversingLabsWin32.Worm.Zorex
              C:\ProgramData\Synaptics\RCX589E.tmp91%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\RtsUpx_n.sys0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\RtsUpx_n.sys0%VirustotalBrowse
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraTR/Dldr.Agent.SH
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraW2000M/Dldr.Agent.17651006
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraTR/Dldr.Agent.SH
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraW2000M/Dldr.Agent.17651006
              C:\ProgramData\Synaptics\RCX589E.tmp100%Joe Sandbox ML
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%Joe Sandbox ML
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraTR/Dldr.Agent.SH
              C:\ProgramData\Synaptics\RCX589E.tmp100%AviraW2000M/Dldr.Agent.17651006
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraTR/Dldr.Agent.SH
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%AviraW2000M/Dldr.Agent.17651006
              C:\ProgramData\Synaptics\RCX589E.tmp100%Joe Sandbox ML
              C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLink
              static.cloudflareinsights.com0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              about:blank0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              freedns.afraid.org
              174.128.246.100
              truefalse
                high
                docs.google.com
                142.251.15.138
                truefalse
                  high
                  s39916.pcdn.co
                  18.160.78.28
                  truefalse
                    unknown
                    static.cloudflareinsights.com
                    104.16.56.101
                    truefalseunknown
                    accounts.google.com
                    142.250.9.84
                    truefalse
                      high
                      www.google.com
                      64.233.177.105
                      truefalse
                        high
                        drive.usercontent.google.com
                        64.233.177.132
                        truefalse
                          high
                          clients.l.google.com
                          142.251.15.101
                          truefalse
                            high
                            downloads.sabrent.com
                            104.20.76.204
                            truefalse
                              high
                              use.fontawesome.com
                              unknown
                              unknownfalse
                                high
                                clients1.google.com
                                unknown
                                unknownfalse
                                  high
                                  clients2.google.com
                                  unknown
                                  unknownfalse
                                    high
                                    xred.mooo.com
                                    unknown
                                    unknownfalse
                                      high
                                      NameMaliciousAntivirus DetectionReputation
                                      about:blankfalse
                                      • Avira URL Cloud: safe
                                      low
                                      https://downloads.sabrent.com/product/hb-b7c3-firmware-update/false
                                        high
                                        http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978false
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          52.113.194.132
                                          unknownUnited States
                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          64.233.176.94
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          20.189.173.5
                                          unknownUnited States
                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          173.194.219.94
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          104.208.16.94
                                          unknownUnited States
                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          142.251.15.101
                                          clients.l.google.comUnited States
                                          15169GOOGLEUSfalse
                                          64.233.177.105
                                          www.google.comUnited States
                                          15169GOOGLEUSfalse
                                          239.255.255.250
                                          unknownReserved
                                          unknownunknownfalse
                                          52.109.8.89
                                          unknownUnited States
                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          64.233.177.113
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          104.16.56.101
                                          static.cloudflareinsights.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          18.160.78.28
                                          s39916.pcdn.coUnited States
                                          3MIT-GATEWAYSUSfalse
                                          142.250.9.84
                                          accounts.google.comUnited States
                                          15169GOOGLEUSfalse
                                          142.251.15.94
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          104.20.76.204
                                          downloads.sabrent.comUnited States
                                          13335CLOUDFLARENETUSfalse
                                          64.233.177.132
                                          drive.usercontent.google.comUnited States
                                          15169GOOGLEUSfalse
                                          108.177.122.95
                                          unknownUnited States
                                          15169GOOGLEUSfalse
                                          40.126.28.21
                                          unknownUnited States
                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                          174.128.246.100
                                          freedns.afraid.orgUnited States
                                          46844ST-BGPUSfalse
                                          23.208.128.100
                                          unknownUnited States
                                          16625AKAMAI-ASUSfalse
                                          172.64.206.38
                                          unknownUnited States
                                          13335CLOUDFLARENETUSfalse
                                          142.251.15.138
                                          docs.google.comUnited States
                                          15169GOOGLEUSfalse
                                          IP
                                          192.168.2.16
                                          Joe Sandbox version:39.0.0 Ruby
                                          Analysis ID:1384873
                                          Start date and time:2024-02-01 13:49:18 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                          Sample URL:https://downloads.sabrent.com/product/hb-b7c3-firmware-update
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:24
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:1
                                          Technologies:
                                          • EGA enabled
                                          Analysis Mode:stream
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal76.troj.win@32/97@27/117
                                          • Exclude process from analysis (whitelisted): SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 142.251.15.94, 34.104.35.123, 64.233.176.94, 172.64.206.38, 172.64.207.38, 108.177.122.95
                                          • Excluded domains from analysis (whitelisted): fonts.googleapis.com, edgedl.me.gvt1.com, fonts.gstatic.com, clientservices.googleapis.com, use.fontawesome.com.cdn.cloudflare.net
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtCreateKey calls found.
                                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                          • Report size getting too big, too many NtEnumerateKey calls found.
                                          • Report size getting too big, too many NtOpenFile calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):1.1337764657815104
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E2485157C5E5EC4158050BBB57DA9A42
                                          SHA1:E58C4183529A732FDA03DAB3280C4811C4DD398F
                                          SHA-256:A840BF398F94C626C4E16314B5F034C771886CF5FD64E71BA79AC85291944D31
                                          SHA-512:0937E49A230BB7CD828E2DB5F4E3724593F1F2FA365A900EA0C2F17B19678BEB9C53B9624F939514735F310BF498C2E7C5FC9152DDF848E596374753061C208F
                                          Malicious:false
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.1.2.6.5.4.7.1.3.5.2.1.1.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.1.2.6.5.4.7.2.7.6.9.0.9.6.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.b.4.1.5.b.b.-.7.6.7.0.-.4.b.5.e.-.8.b.6.8.-.8.1.0.5.7.5.e.0.6.8.c.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.1.7.e.4.a.1.a.-.8.9.b.8.-.4.4.d.e.-.9.a.2.e.-.e.c.a.c.5.7.8.9.2.5.c.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.y.n.a.p.t.i.c.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.d.0.-.0.0.0.1.-.0.0.1.4.-.b.d.b.1.-.5.2.4.e.0.d.5.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.9.9.a.1.3.7.d.5.9.3.d.d.a.9.d.1.5.8.d.c.8.b.6.b.7.7.2.0.d.e.b.0.0.0.0.1.f.0.4.!.0.0.0.0.5.d.f.a.4.2.0.4.1.2.8.2.3.a.b.3.3.0.4.9.9.4.2.f.a.f.9.0.c.1.8.2.b.4.e.a.6.f.e.f.!.S.y.n.a.p.t.i.c.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 15 streams, Thu Feb 1 12:51:11 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):790542
                                          Entropy (8bit):2.2022678240142883
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:79491292C859575AAC2B89407626A13D
                                          SHA1:95AC992F7B8AF8B065308C1D7595A20909298C6D
                                          SHA-256:E217C93149E12993CBD60FC90EBB5FDD56CE67CCCB802D772801C00FD57B315F
                                          SHA-512:DC6502A94949E264EA8E1684B692CCE03A03329161EC75F200C41BD23D6C7FB18192F8E9976A7A728829B1F1F074E7BD98F662494D2A7CED5D7C76ACEFFA2BD6
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... ..........e....................................$...p7.......(..n>..........`.......8...........T................l...........7...........9..............................................................................eJ.......:......GenuineIntel............T..............e.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):6318
                                          Entropy (8bit):3.7161126629889862
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F4E3A18A9B250520AA64E2AAA1FC8ABC
                                          SHA1:3FDFF6C60C58E1467CAF57AB3C6316EE2B266DCA
                                          SHA-256:C962584D96C8A25FE27CA8BBEA1D7B75189843149BE1F2ECDC5CF6C51C3254DB
                                          SHA-512:19CC0DF17386CF78A3A0790A8302975614DB3975A24D1178D7596F5F3B42585F09F12F60927B6119CCBA76394758F099C9FBF4628313DB9B77DB6385DC58474B
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.5.2.<./.P.i.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4572
                                          Entropy (8bit):4.439625990053263
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C02AC65263DD8330479F96569EFCB4A8
                                          SHA1:7AF34624F3D3111BA886BF49440A832CEDE1DFBB
                                          SHA-256:DD45EDF85921C14F6136292C3FA5400E7A9CFF8B72F0B63FA4F44364CEB7E51D
                                          SHA-512:27EBB6BCFD914F4691CFCCCFBACF4B3F94E8243A3B76FBA4267FBB83C57BEB393BD854DB9F110D02139371FA5002E9B87C9E9204E8AD83ADDA428C9110524C07
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="174473" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):775680
                                          Entropy (8bit):6.6156126330712866
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:84768A60EDD32D454245C2A26D2D5FA6
                                          SHA1:5DFA420412823AB33049942FAF90C182B4EA6FEF
                                          SHA-256:2323F5DBE8945C82E8425ED5FF81B1BB83863763CAEF7AEFEC311F11DB50B9A9
                                          SHA-512:DE0BEEBF21AECAF84F8C45E5BFC6780F2BBB49D369DE999DF20D39EE50B657B15151C76FF32E869345BB35931624BB45E0766D005685ECD569D49C6E4409668F
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\Synaptics\RCX589E.tmp, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\Synaptics\RCX589E.tmp, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\Synaptics\RCX589E.tmp, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 92%
                                          • Antivirus: Virustotal, Detection: 91%, Browse
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Reputation:low
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................6....................@..........................0...................@..............................B*.......-...................P...............@..!............@......................................................CODE............................... ..`DATA....T........0..................@...BSS......................................idata..B*.......,..................@....tls.........0...........................rdata..9....@......................@..P.reloc.......P......................@..P.rsrc....-..........................@..P....................................@..P........................................................................................................................................
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):0
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9BD61BF5EBF851EA7815B6358CFBDCE0
                                          SHA1:2F448D4C580ABA06DA38316879FB8042CAEF678B
                                          SHA-256:1F5E3825D2BCDC94433C2FD7A278944A4C000399E93977B815A782B962D21F33
                                          SHA-512:07C5EE7A02F55B4384609603C12CF2F8BC1F45D502CB4130DF278B178871CE6458EC017A5082EF02AEB1632BBCAA045E350C074D9A91439D0ECCB0CE763D2D78
                                          Malicious:true
                                          Reputation:low
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*......................d...................@...........................n..................@..............................B*........b..................P...............@..!............@......................................................CODE............................... ..`DATA....T........0..................@...BSS......................................idata..B*.......,..................@....tls.........0...........................rdata..9....@......................@..P.reloc.......P......................@..P.rsrc.....b.......b.................@..P....................................@..P........................................................................................................................................
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.272393954528021
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6BA2F99D06B2E183E0EE90C872AAC777
                                          SHA1:8007E68720EB28B3213DFDAD03A9BC7BD869E392
                                          SHA-256:44BFC176A9103B6554DC26D275EB5A43771D076F162D3B481137B63A5786D4B3
                                          SHA-512:353A915CC957D5E1AD42FB2976BDBE737D8857E409F4E7FEC9D033659DC1E2952F31BCAD1D995A8796F528AC2FE8544F0960AAF1BBD74287E24BBA6895BB1596
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="FU-GJ-vqBdICrb1tIDOHLA">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.266500257501095
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E5685C63E83B8D8E6014832AAA7ED0F7
                                          SHA1:FC9A08ECB96F72923D67AE8370A209BF32AC367A
                                          SHA-256:30FE7F8B961303208AD8D6B3BAA1A437171032F86B9440BBAA2220826A7FA819
                                          SHA-512:426ED6094DFB8E9B3829AFF3C9E5D86CD173F5776AC321DD86632B25A2DC01D920AE165871D998B0A10BB0E801A607933C9D3B60D0B0C5382CEB4EF09BD7F504
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="B4ZXEhUppSbpAPR7jo4LTw">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.254876384887648
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:98BC48DE5766A2A75BBD4AAEC4A52954
                                          SHA1:58EF9A8101BAD4F11760D75808AF17386AED6617
                                          SHA-256:A65BAEFC712EB8CB7693C02C6284C9E78A60560EAB95D029A1FD6695236CED5B
                                          SHA-512:37685D371E36E5AA57C8F5351A5D67CB90A9327DD11279879419B152436E6F119F3A3CF4DB917F75215AB60EECDA3B0B2E8AC578120496129F476415C5F9A43A
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="b2ZsNef6LExUXdvwOncQcg">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):959
                                          Entropy (8bit):2.5673094941004253
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:75DCC0F402089286B59D890B9D207626
                                          SHA1:FC6A4C2B5AD03970DF8804770513ADBD9D4DAD54
                                          SHA-256:19A1A830FE029FE1A0D65C0C239E032A7E35DF507E0AF0B5D4B3AEFAFF768E4C
                                          SHA-512:FD10253B9E86826AC548B76ABEDFE3CEA6DF5AD32FFECB7927A1A0AE9824D5575C6AA3B1F571E1BFAA605729B7059103AC8E52AD2CCE7C378A170BA9DD6D9F5C
                                          Malicious:false
                                          Reputation:low
                                          Preview:. ..............CMFCToolBarMenuButton................&.F.i.l.e.....................................................&.N.e.w...C.t.r.l.+.N.....................................................&.O.p.e.n.........C.t.r.l.+.O.....................................................&.S.a.v.e...C.t.r.l.+.S.....................................A...............E.&.x.i.t.....................................................A.c.t.i.o.n.....................................................R.e.S.t.a.r.t.....................................................S.t.o.p.....................................................C.o.n.f.i.g.....................................................&.V.i.e.w.....................................................&.S.t.a.t.u.s. .B.a.r.....................................................&.H.e.l.p.....................................@...............&.A.b.o.u.t. .R.H.C._.2.0.1.0.................................................M.e.n.u. .B.a.r.....
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):959
                                          Entropy (8bit):2.4956788499499916
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7DE51DAA2AE6A1EEB8A6D367DFE1C921
                                          SHA1:72C4DCE3F681E28FEBDDAB9966FAA1FE97EABCDE
                                          SHA-256:924F69A350C90994CC619722A0FEFE84A227A311BE1C909FA830EA5A929FA7D1
                                          SHA-512:E1A5303079658EB76FEFCC3264169BABDCA45925900D68A5782E04D86E3BE489B082D46648B00066499A4C88ADEAF80432729E1AA833159DD6443673D3084EC1
                                          Malicious:false
                                          Reputation:low
                                          Preview:. ..............CMFCToolBarMenuButton................&.F.i.l.e.....................................................&.N.e.w...C.t.r.l.+.N.....................................................&.O.p.e.n.........C.t.r.l.+.O.....................................................&.S.a.v.e...C.t.r.l.+.S.....................................A...............E.&.x.i.t.....................................................A.c.t.i.o.n.....................................................R.e.S.t.a.r.t.....................................................S.t.o.p.....................................................C.o.n.f.i.g.....................................................&.V.i.e.w.....................................................&.S.t.a.t.u.s. .B.a.r.....................................................&.H.e.l.p.....................................@...............&.A.b.o.u.t. .R.H.C._.2.0.1.0.................................................M.e.n.u. .B.a.r.....
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.264902505640515
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7FE1FF6A261BCF2DBBA84068E86DBFA4
                                          SHA1:147F7FBF681949AE17D7EB4BDF66CA5878ABC76A
                                          SHA-256:C96C5F955AD73D0CD63E51A3000ED6A1397599EE82BC1131C48787F023D4120A
                                          SHA-512:C4541DE2D1ABAB72624D910823D58AFA816558F261A98A5A6AE6ACFD6E917D94B70818CB198A3B5D2D1C90ABDBB4AD060A73715953FAAAD202E3C469F64AFED5
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="JSP_iVWN6sPaNMvHfxdn5w">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.257032147393339
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9322D9D49638B0626498A6B4E7F9ADA8
                                          SHA1:A45CA50BE64B8EAE6DCFE452B8AAEC699E3BC17F
                                          SHA-256:51483BB813E5EF8323BAEA5215BF980E2399FBDA463838930E324EBA9303C98A
                                          SHA-512:47EAF5A4FFA72DC3B723EE4C2ED078A04145D8BD81F98784CDF3ED12B322CE325BA147D895F2B4DA5A1142F484A7C2224D2250241D2437C9711AECF97E35BD51
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="OcVE1kaj2y0gDGsGaT3C7g">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.262888125703497
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B3871B532FBF956B0279C00484888EE8
                                          SHA1:9A18E65DD2561042CE4ADEB6F5E5835EE9A453B8
                                          SHA-256:0D2BD60F936CE1123F258DB5435FCFB5AD29A09B216DCDDE663AC2D39B786EF2
                                          SHA-512:BA93C312C368BEC0D0BA26F7B24A52AEA694B81DE6AA4502F16AFD31EDB5095C130FD62CCEEDAA04A08E881B8D711A1C6DA9D5D3A82168AA0E08AB8083D02AAC
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="abH4gvMb3CUdSsfC0hS86Q">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.252487882616113
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2CEBB09BFCE08990B7E93AFA07B08C30
                                          SHA1:5B2B4843E0553800004A6DF12B7FA929084EB8AC
                                          SHA-256:734B148D32DEAD49E088A192CFA1313050B9ED09CFE4D46CA07F65CAAFEC3550
                                          SHA-512:7CF815D316780940E882E017ADC21C6D6D10BBC31EA3B1C079549F0312C4697A71025DA099C48BEF38D3F2EF877CC547546FABDBD18EABB32E69A796760383A3
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="olAKANNlxxove0boRO376A">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.260931172770494
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0A9FBC77A2637BE0A5016FF7DA67A6E0
                                          SHA1:DA3505903853B83EC45B6D1F0D3FAD284F07891E
                                          SHA-256:5998C3B851913129F55B4261F57C5CF2E1C0D32F34856C8693B615259657ABC2
                                          SHA-512:14E2922FF3B3605D1720AA34522204F73488BF8861011E34CDA00CEB5B4C7C09B10B9AD5126DF466B6B130329FBE5EF8CC75E6ABC66250D65B9C5768A8FD3248
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="nWAr9pAx_0lCXIhLJrMciQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.252927192787539
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:97FB92758E165FACA2955EB8F8937F51
                                          SHA1:DD2D1F9AD50E5CFC1CF536362FCC1692EDF9E25C
                                          SHA-256:7F17C8E1B238AC6C41F2FA4260F8E2E5639655C64B75220BB859F335FD3452BD
                                          SHA-512:6B851E4DB2498279D6624F2C512AFC0FB1F74BA51E7D0A1A90D93DBE2F5CDDA983DE2855A9F8CB027460E1E95AD8A1A36215172CF787046E687CA72D3F8E7C02
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="WomyR-cT1W9eiRuSHBpdiQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.263573448032951
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6A73A21A0DBCAB7068E775C1FC20D2DA
                                          SHA1:1D2966790D958A00509BAA93663BEDE6C8EFCF47
                                          SHA-256:4572E3AD5500307607F2EDE468AE15D675BE1FDC60A47D3C40AED2B1164FF00C
                                          SHA-512:833A992371C8B0681E74C6483118536469ED99379173EFD98BCBCD48C2F786FC4BDE22689C0FF8B8235881F520572B03F3FB9810F4C0DF1630AD1E666826EB4B
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="PwhE03K0-T113KOQJtKsFQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.255945207010206
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:AA56715CD07ED160D81E309D0F6F4002
                                          SHA1:B31D2ACA034A60612F19CE401F642748066CC8CD
                                          SHA-256:3C525FA5D4FE8C2E48879EB1F92A9D6CE106A4C3DA92605ACAE1709C0F87876E
                                          SHA-512:6580663CF50B843A2042893FA863AE98A4AD39FB007B3CA394AB809F9B9D1E611ABFBE92B91229027167EFAEAD4E8BFDA67B12AB4475E57E6C3EE4895BB66AE0
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="xbtd1jWJ5BZ6vFor8Gwm5w">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.254254663202273
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A43A7740C653C374E9156147B8B3BBD6
                                          SHA1:099091D3AC025452ADC83ADEA63B41A93FA0BCFA
                                          SHA-256:42A18C4B13A4D259E33CD70D6AC83A462B617C19B5F8E6F3EF21014E359512A2
                                          SHA-512:68ED68BD1588A3F1EFDF15BE26E3FEE885071F06E685487BDF373A5E5E796D60F967F05850204ACDEB4925EB5E16B39BD395FDB884E88C5856B4FD9C9FF1C707
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="iwo2Pt04-C9EVnemTpjCJQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.262617288222168
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:ED2FCE5CD5611926815CA1B261D0ACEC
                                          SHA1:BF90CF42042554F0791071D2E4E219A8D42CD596
                                          SHA-256:C0417FD1ED95A7953DCA3F458E1A679741C1B5E3414E12484BDF8568C664AE10
                                          SHA-512:DA6B10943B7BAF0741DEC89311739CD43C16E1B34BC8944100575309D4EB9279655F513405B10E12590B5678920A15C619C6EE83EC94E46BC1FBADE975E38AAD
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="hQ3yHG3PeVlibdcjPDnYXg">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.265425709512227
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B9E17BE53B4FF879ACAE16CED4910EA3
                                          SHA1:F8DA1C5644C3B7FB39FFF26B4F860F76680814F2
                                          SHA-256:1F6D4E68142273267F7AFEB429EC16CC069086BAA1BDAC0F1972FC1CE8A786A9
                                          SHA-512:A88F946FC313C8A7634FEF60E31B83995C496DB44056EDEA73A377FC440B72C0D4552677846C01642A83A3AE90A03CFCB34E54454C87197657BCB8C149419309
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="iVtZLaAVxqBntj7BVQKtZw">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe
                                          File Type:PE32+ executable (native) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):35864
                                          Entropy (8bit):6.2408265182458065
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B1A3B819188C976B5EAF3DD10A7EA8C5
                                          SHA1:0D6F87BB6C417EB1260255813B3B67A4641DFD6C
                                          SHA-256:83C49F3EE1BAF8E62BEC2F0A9C0433CFD5E2F53C659F8A621777B1C34EB85803
                                          SHA-512:CD672D1067019AD02A86A08CC7465E25B0F83DBF07D5142728557FF03FDE3CFBBF10E7F406F6F4B976934B91D6B99705C527172B5141B2A5825259DE794F3FD8
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[...........................................g......g.9....g......Rich...........................PE..d...Z-.a.........."......F.....................@.....................................M....`A................................................T...(............P.......h...$......D....7..8............................7...............0...............................text............................... ..h.rdata..4....0......................@..H.data...P....@......................@....pdata.......P.......2..............@..HPAGE.........`... ...6.............. ..`INIT.................V.............. ..b.rsrc................b..............@..B.reloc..D............f..............@..B................................................................................................................................................................................
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.247258765581503
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BEF55AA7640658D739B50987EAF4C86E
                                          SHA1:FB56801722BD87C481AF96FD5557F86AAF9CAC72
                                          SHA-256:EE92A4E01DE52B3D0F393C0D70DBE8033FE897E882522F241680D77ED645548A
                                          SHA-512:8451B9B5B270149CD671440CB7B56554743A762B6EBD0705DB0AD881D4BD202FAF4D64A454F921362B1A3D71F786BAD0FC27CB64473042B5FC0C2B3171F46CE0
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="abed4MC60G2_VntoTnFgZg">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.265209451755577
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:96093FAAE7E0D6D6CD82CC01DFE59870
                                          SHA1:D77382D58293187DF21CD6737466530E959C0D46
                                          SHA-256:3A282E199E5B904985634F32F28840EE1443E1B6E47AF2A721EB39664645E9C9
                                          SHA-512:E0E387306BE2B633148B894CB308851CE89EEB12FBC353F76EE8B6361AA491430335EAE39B2D5F2315C60CF74570D11516E540CB62BA437B96C60C57392E4C95
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="g-va3ikuUIS3SBbFGJqMJw">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.273054330153584
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:60DD7CFDFEDF2FA8ABF7ABAD69F02861
                                          SHA1:8457F888149B2DFD0F99952D4DBB42418D44E5E7
                                          SHA-256:F4DE654603ECC4D199B57A62B5DEC6ACBDD2691ACB17B4AAAA660A48846A9A0E
                                          SHA-512:4B82D437E21530B4625E42FADC17A957E552DCA953129B53C6CE1BBF3B783460E03EE713654D2B9E85EFB579B63AFDF864C1E2E757AF4783961AFCB2A0E0B28C
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="BMXr6BQXhhnxCS6StcKIZw">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.250863918645514
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9DDD312D2322F98780DB6123DBE69825
                                          SHA1:515B4E610AB6E0D15A16F36258DC711B4E4EC6C8
                                          SHA-256:C2BA1CFB09349A5201D7F91F6327CBAB7B93381C8289708C634B12008B187AC6
                                          SHA-512:132CFCA9B5E2B158935C9B77BF675199BA12D98AFBABCCB7AB31C10BBAA7F9C6C90776DA1EED5FE9055F89F5D22D32C854E42ABD074C5EE14EF5378FAF974EC1
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="veVRGX1dglsegnmu6P3Iqw">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.268196241144944
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E26B5834DD6A79154390B9DC78E76E2F
                                          SHA1:261BFD9E77C91A64504B314A1B6D0FCA21C299F3
                                          SHA-256:B2B6773B14AD705CFD8343F0994DCFE49023E7AA2E00106388CD049E4C0FC5F3
                                          SHA-512:F1485012D3C88C390CD6473EE05C18B0AD35F2770AD8D6CEAD96F2ADF74777D800694C7EF9D9F49D978BA3DEF16CFD07965FED537732F1AB884F99CF2A69AE54
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="GcO41S0uZG4eZjQQ6rhzJQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.269801713094831
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:265AD9D18DC10D5C42BFB15B71B8ECA9
                                          SHA1:BE4C5DBB1FCB7743C8BBC301683B489687AE958A
                                          SHA-256:C7C4A736A1B021417695E3E9C7665BE575CC7EEE4E67353CD6924ACFB906FC1D
                                          SHA-512:1AAB94F66BD098C73FCFDF001716EF95A844C2E6593505E036585EFFBFF1F7A4B0D2922D426F59418D06E7B50A6BA637CC64ABA7403746FE69B3F596C3306593
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="3OAYXbtkC5CqkWddzGWWbA">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1638), with no line terminators
                                          Category:dropped
                                          Size (bytes):1642
                                          Entropy (8bit):5.265404919008511
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9F863BA1AF2D7AB4B1935D128307ABCB
                                          SHA1:6E397775DEF467A3982B542272037448A291C1C8
                                          SHA-256:789639FC707E4B30226ABC216D67BBED01F0BB58B18240CB43771C6EC4491C1C
                                          SHA-512:324ED74F6043865D5982029431301FD3AFDDDABB27222E3718CD3F3E49B47DA465702C3550B9560E92E7A5E7F3EBD852601A5196BE6983C76264800A2ACB027C
                                          Malicious:false
                                          Reputation:low
                                          Preview:<html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="lM0OhrizrwQjmDIPAErUNQ">*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{color:#222;text-align:unset;margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px;}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}pre{white-space:pre-wrap;}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/googlelogo_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#logo{background:url(//www.google.com/images/branding/googlelogo/2x/googlelogo_color_150x54dp.png) n
                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):32768
                                          Entropy (8bit):3.746897789531007
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7426F318A20A187D88A6EC88BBB53BAF
                                          SHA1:4F2C80834F4B5C9FCF6F4B1D4BF82C9F7CCB92CA
                                          SHA-256:9AF85C0291203D0F536AA3F4CB7D5FBD4554B331BF4254A6ECD99FE419217830
                                          SHA-512:EC7BAA93D8E3ACC738883BAA5AEDF22137C26330179164C8FCE7D7F578C552119F58573D941B7BEFC4E6848C0ADEEF358B929A733867923EE31CD2717BE20B80
                                          Malicious:false
                                          Reputation:low
                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Feb 1 11:49:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2673
                                          Entropy (8bit):3.980251376045073
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:4760EBD999BCD7D1CE1999CD097A7FF4
                                          SHA1:46BA6EBE065D97DCED0097B0ED986C55D31D93EE
                                          SHA-256:1E7DE51E478F71ACB8C998B0812EF4192F4C0CD6BBA0C383C5E2F527FBAAC75E
                                          SHA-512:DD971DB9BEC88A668DDF5B4705F02E8E0E3FC4127E5BE965964364CC1640C757AFA5435F5F1CB52CF699067B8547A219BF2E43BE131F800512A1B6F5027809CD
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,.......".U..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAX8f...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Feb 1 11:49:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2675
                                          Entropy (8bit):3.9932243592483063
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FAD307E58C00FC795C3B8E675C748317
                                          SHA1:DB0A71D7E8940B3892D263A5D1506AFD2964C96C
                                          SHA-256:CF0BC047F2EB47DE18A2D507CDEFD622D218A12CCD4BBB7EC24E255E1700B98E
                                          SHA-512:0B4FFCB7FD20DC265A3BDE3DDE915E1DF4D2612A8D3CDD9D093D1622D542DC95CDFA7B27B0CC1633A2FCA4F430E9723593599FF536609D4FB50A7DE6B780772D
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,.....V.".U..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAX8f...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2689
                                          Entropy (8bit):4.002703963272355
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FB03FC7BFFCA97FB3E3EC3AB484B042F
                                          SHA1:C8CAA130685A343CC70045910A09C9A7E89ECD7E
                                          SHA-256:360F187A4C230007E7DE5BE93E1654398F0F23CB2FB25DC7101E8E47BBEBE16F
                                          SHA-512:6319C3D90BF91C300376A18F5D34EC3B94FA2C0C18F1DFE332A288CCE02331554C16849129B04C51438B5C1A4C668EC9A4C42A1709CDEDD3B1C91CA92E2640B6
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Feb 1 11:49:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.99160763192396
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:02E80512E99ACF95CD32A793CE25926E
                                          SHA1:84515E87495F21DD36638DB537116612B1FF3756
                                          SHA-256:8003CA3B663360F35BDF6DB547FCEA7D7C4189D7788B018BEC7FDF0D84964D91
                                          SHA-512:C135DD9DA4DF57538AD12CE5BACB8DE7DB2FD02D61EAD1BAAC09BDFB87C8C092617855A15FDE358332EC9F91D429904DCC1B2D7FB52F5F7721296D0E9CEA06C8
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,.......".U..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAX8f...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Feb 1 11:49:47 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2677
                                          Entropy (8bit):3.9819668770988232
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:1E802A833CC2CF6584E4E219D68E1D84
                                          SHA1:389A7808115D38CD0D681306ED0F3D915313D5ED
                                          SHA-256:37CD6678D321B4CC805C172B2954A30008057B84839FC2D3F2E7053712885F1C
                                          SHA-512:0F8A9F2185FDB2C50C9BD459F901A91CA4FD0172BFC24B5F13BCE16A3EFF2CBFFD26040F062BC155EAEFAC70E21C60FC1BB462F5ECA1692B0CB9D76A2889D17F
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,.......".U..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAX8f...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Feb 1 11:49:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                          Category:dropped
                                          Size (bytes):2679
                                          Entropy (8bit):3.989950915228154
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C642B68C553BA3CD62D9742CAFA1D835
                                          SHA1:8C8B816C7FCD79286BD5907D6D556F6162208C18
                                          SHA-256:294FC8B1F402C26202FE79D72B9924F0ED062D14EEC227E2F52BD17228FFFD2A
                                          SHA-512:A07555416AA9F8BEB7157338B11AEC6B3B589F09F1550FC2EDC14CF9940DB5ACE4571E4EA6EC71D52690826E546F0597C025E0B3EF002ABB494A6A82286FD0D9
                                          Malicious:false
                                          Reputation:low
                                          Preview:L..................F.@.. ...$+.,....\..".U..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAX0f....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAX6f....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAX6f....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAX6f..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAX8f...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........T.S......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:Microsoft Excel 2007+
                                          Category:dropped
                                          Size (bytes):18387
                                          Entropy (8bit):7.523057953697544
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E566FC53051035E1E6FD0ED1823DE0F9
                                          SHA1:00BC96C48B98676ECD67E81A6F1D7754E4156044
                                          SHA-256:8E574B4AE6502230C0829E2319A6C146AEBD51B7008BF5BBFB731424D7952C15
                                          SHA-512:A12F56FF30EA35381C2B8F8AF2446CF1DAA21EE872E98CAD4B863DB060ACD4C33C5760918C277DADB7A490CB4CA2F925D59C70DC5171E16601A11BC4A6542B04
                                          Malicious:false
                                          Reputation:low
                                          Preview:PK..........!...5Qr...?.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-..@.5.....(..8...-.[.g.......M^..s.5.4.I..P;..!....r....}._.G.`....Y....M.7....&.m1cU..I.T.....`.t...^.Bx..r..~0x....6...`....reb2m.s.$.%...-*c.{...dT.m.kL]Yj.|..Yp..".G.......r...).#b.=.QN'...i..w.s..$3..)).....2wn..ls.F..X.D^K.......Cj.sx..E..n._ ....pjUS.9.....j..L...>".....w.... ....l{.sd*...G.....wC.F... D..1<..=...z.As.]...#l..........PK..........!..U0#....L......._rels/.rels ...(...............
                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\EXCEL.EXE
                                          File Type:data
                                          Category:modified
                                          Size (bytes):165
                                          Entropy (8bit):1.3520167401771568
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9AC4D67F6E514F452D4A1DB79CE3B2E8
                                          SHA1:33F8C665ECBB81275D2E49D48F2565A58A282043
                                          SHA-256:407E1D871964C93DBDBD4D00613CD0A9E30D3ED6352D8052C58E7A252D52FC5A
                                          SHA-512:018D0F54AB0AB01F27E9FB870A128F2F581A58487399DD7FB56A94EC4AAEC6874708A5AD5650F362485E45E2C6A557ED08524C5B8335F83F240E0962281A0F1A
                                          Malicious:false
                                          Reputation:low
                                          Preview:.user ..c.a.l.i. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                          Process:C:\ProgramData\Synaptics\Synaptics.exe
                                          File Type:Microsoft Excel 2007+
                                          Category:dropped
                                          Size (bytes):0
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E566FC53051035E1E6FD0ED1823DE0F9
                                          SHA1:00BC96C48B98676ECD67E81A6F1D7754E4156044
                                          SHA-256:8E574B4AE6502230C0829E2319A6C146AEBD51B7008BF5BBFB731424D7952C15
                                          SHA-512:A12F56FF30EA35381C2B8F8AF2446CF1DAA21EE872E98CAD4B863DB060ACD4C33C5760918C277DADB7A490CB4CA2F925D59C70DC5171E16601A11BC4A6542B04
                                          Malicious:false
                                          Reputation:low
                                          Preview:PK..........!...5Qr...?.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-..@.5.....(..8...-.[.g.......M^..s.5.4.I..P;..!....r....}._.G.`....Y....M.7....&.m1cU..I.T.....`.t...^.Bx..r..~0x....6...`....reb2m.s.$.%...-*c.{...dT.m.kL]Yj.|..Yp..".G.......r...).#b.=.QN'...i..w.s..$3..)).....2wn..ls.F..X.D^K.......Cj.sx..E..n._ ....pjUS.9.....j..L...>".....w.... ....l{.sd*...G.....wC.F... D..1<..=...z.As.]...#l..........PK..........!..U0#....L......._rels/.rels ...(...............
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):5.156211484567816
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BC594F787DA9CF2B9EE22358E95D62DC
                                          SHA1:77C65912B596F21DEEE65E0A85E260184EDB67ED
                                          SHA-256:A94308815552E4BF26440699C7120E4275AAA2A53F3ADD91EDA072B54141BE55
                                          SHA-512:37C67D8FE466C5A8600837A74C42A4FF1AE6EA89F7F0B590C37957F22444CC2D51B47F9871A47586366F03ED4044F0943AEB3EAC1DCBDED4744982C20EC60CA9
                                          Malicious:false
                                          Reputation:low
                                          Preview:....Xx".....I7......aD......E5.T..p"......g........F.......>..........2.......x.......p..........d..........X..........L......i..3............3........................................".....................................`..N`...$....P....$....P.##E.#..~s........"P.."...."....."....)...:..."P..%..."....%...".)...:..."........"P.."....".....)...:...."P..%..."....%...".....(...."..........."P......".........".......t.."..........P....'....7."......%......8.".....t..%.....8"..........."P......"........."....B..B..E."........"....p.t..p.....t.......st..h`........s..%.....5........."........"......"..%.....5...".N`..`.............."..P.......".........".....(.......p....8."B....A...A...A...A...A...A...A.....A...A...A...A...A.........A...A...D..''''D......D......A...A...A..2........A...A...A.. H...a.b.c.dA...B......A...A.....A.......A...B....A...A...B....B......A...B....A...A...A....x.....u..u..u.].`..........@.....
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):5.156184387433133
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:91908E0212D2D5376EAF5652C0D7A00F
                                          SHA1:6C41126B8445F2CFE2517843F9D187B19491CBA0
                                          SHA-256:22C10BE20C47159BE50AE8AE381E9939B0327501D7E09ECEDF574D1D9BB9B525
                                          SHA-512:DDCC196142C820934E47C9216F133E27B05A273B3473E02279D2034A482DFCAD8FC0A74A52CD142E2ED13DB6327A1E58C46619CEAB8ADC464D62D2C9A0C8479F
                                          Malicious:false
                                          Reputation:low
                                          Preview:....Xx".....I7......aD......E5.T..p"......g........F.......>..........2.......x.......p..........d..........X..........L......i..3............3........................................".....................................`..N`...$....P....$....P.##E.#..~s........"P.."...."....."....)...:..."P..%..."....%...".)...:..."........"P.."....".....)...:...."P..%..."....%...".....(...."..........."P......".........".......t.."..........P....'....7."......%......8.".....t..%.....8"..........."P......"........."....B..B..E."........"....p.t..p.....t.......st..h`........s..%.....5........."........"......"..%.....5...".N`..`.............."..P.......".........".....(.......p....8."B....A...A...A...A...A...A...A.....A...A...A...A...A.........A...A...D..''''D......D......A...A...A..2........A...A...A.. H...a.b.c.dA...B......A...A.....A.......A...B....A...A...B....B......A...B....A...A...A....x.....u..u..u.].`..........@.....
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:Microsoft Word 2007+
                                          Category:dropped
                                          Size (bytes):279007
                                          Entropy (8bit):7.9652709106978
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DFEEBD7A58250231865B3953149832C8
                                          SHA1:C5F84A8F1D4861B8DB1E6FEAAF1E03996500AA93
                                          SHA-256:845CD180E85AB39AA7FD87690EE4AAAFFE47E2A5289A0757C01AFCD9224B30B1
                                          SHA-512:87F105F8CC39A9CCDC8BF2A334102CF7B6B077F73685CDEE286174D4493EFCCEA7B9D6FBCB821E7BB96BB02476655D7073D96974CBE33B700BF18547F679C595
                                          Malicious:false
                                          Reputation:low
                                          Preview:PK.........N.@................docProps/PK.........N.@"9..^...r.......docProps/app.xml...n.0.D...Q.@( cDC9U-.....,.jb[.A..uH...Yy..C...`.Pr.&1...\.B.g.XE.0....J.,..........`.....iga."dy...._K.9(.0.9"u8..K.O.H.R.G...d.e..a.8=......|...j.LI.........q.\C..%kv.K.....)-..u..+f.w.N..S.]H......;.....S.P..h.f.......r.K...@..h..V.j......=..p.F3..=0{>Yh]../.....V.>Ib.~...x._%o...5...$......I.F8.!.c.....I...~2.].k....[..PK.........N.@Y.f.8...].......docProps/core.xml..Ak. ......=Q.R.$)l.......M.k+.F.-.I....^.....).G.$..jM.hFP.F.R.}..6.t......i.T...-...RX&Z./......D..L...B..c/...."ab.k..!~.=.\|.=...9.....^...F....~.f.H....&xL3....N.?.....U8.x...[.s8.G.&..+...?......2.].@u)....x..D.;owI.....9...S...+.F...j\.....4/..i.......O.S .N.u.L..H...%l.3:.jw..%..!..PK.........N.@....*...........docProps/custom.xml..MK.@....!.}..M.lIR..xPP{.....n..T....R.x.....yf&]..!8.c{.2@B....n{......& ..Qm3h%2p........Q....x....;7...|/dcC.+.t........Z.I....x..d..p..3oyp.E.
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):6409688
                                          Entropy (8bit):6.885747753150717
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:2C3251B9881C1F5D2E90B0D506BB3B0F
                                          SHA1:470CC5AE6503EA489C2A1D2FDB208BA6E47DE352
                                          SHA-256:699D1AA885275934DF2FBE009E892C4277B5558E25B798990D8D2F5459281A79
                                          SHA-512:D9283D83E9FF2FA7029780BB0BDF99B7CBDD0321DEB81DA8D4B31B3D9C46DB21621EC707A87BBDAE2FBC321C486A21EB99C32D158DF8B0103CA716EC0B0A30AB
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\...................>.....................................?...*....E..n..............Rich..........................PE..L...-.+b.................J9...(..............`9...@..........................0b.....{.b...@...................................F.......H...............a.......].l`.. %B.p....................&B......%B.@............`9..............................text...:H9......J9................. ..`.rdata......`9......N9.............@..@.data........ G.......G.............@....rsrc.........H.......G.............@..@.reloc..l`....]..b...L].............@..B................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, cbSize 49206, bits offset 54
                                          Category:dropped
                                          Size (bytes):49206
                                          Entropy (8bit):0.5481393552295659
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F125384065161022119CA470BBB13281
                                          SHA1:2C467EC084E0361B43A278BE4935693E81B8F3B3
                                          SHA-256:6AE36093A90591CA46006E06418735F6C1970BA7423426A179A66659B6FA2CEE
                                          SHA-512:CEC9AF142A61BAF4D34DF5A0D59F2F7A66E61FE29E368F543D0CE2B9F372F2F5CB790FEE7139381077027404EE6C21B4FAF8E25251ABDA70D37957F5DF2F164E
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM6.......6...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 256 x 256 x 24, image size 196608, cbSize 196662, bits offset 54
                                          Category:dropped
                                          Size (bytes):196662
                                          Entropy (8bit):5.275448397355487
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:8C5DD78F6D81AFD25578DA4628A68A55
                                          SHA1:FAA112E125EE79A06681FD13BD47B8F945B0A944
                                          SHA-256:56F41FEEAD0295FACC9BD6CA2D56EEB0E5AA90BF708CB1719E423A71847D9BDA
                                          SHA-512:1EC2D99ABD483DC7ED77E3EC5E16A80F896C7BEAC852A546C9A4029ECC01C452A4D281B4F7B6DED17A7EDCE3492662B08C61AB722A14214C61F324D9BF7D5EEA
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM6.......6...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 102 x 95 x 24, image size 29260, resolution 3780 x 3780 px/m, cbSize 29314, bits offset 54
                                          Category:dropped
                                          Size (bytes):29314
                                          Entropy (8bit):0.7800815574918826
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:EC1C9565CB5543AE6E670F260352B701
                                          SHA1:EABD33CA9A8ACA18403F4B617FA4785F1BB2A509
                                          SHA-256:2C1D7456CF78D7BA8A5DB431433ED5F2902A541BBA0B09794D6E9BB7940C6E38
                                          SHA-512:CD1949964B8C98DA42149760C1A38CE2E95F956B12C29BEF3F4E33711A083B0B63DFF13F9E6A35587784E9F25A8C72AF0DAF8AEBE36138F3BF0929CC70FD6D6C
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM.r......6...(...f..._...........Lr....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 111 x 113 x 24, image size 37968, resolution 3780 x 3780 px/m, cbSize 38022, bits offset 54
                                          Category:dropped
                                          Size (bytes):38022
                                          Entropy (8bit):1.5025197181206207
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D6092DBDAFE07216418C9A81932B1BC8
                                          SHA1:C9A499054C279220DCDAD79429FD74C7545C9D5D
                                          SHA-256:651EB20A6F9C446A1E2D7AD9AB9DD78BE577CCE0BBA5EE9D6D9A69F767ED8970
                                          SHA-512:C8B6F508996466053885DD7E31DF46284847CFF4E0C0C02843B6191D7C32FDB832C0FD6FA00CBE8C477144F39CFA62E3FDB9BDDE45FF1D8FCA8219B5BEC38AD7
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM........6...(...o...q...........P.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 111 x 109 x 24, image size 36624, resolution 3780 x 3780 px/m, cbSize 36678, bits offset 54
                                          Category:dropped
                                          Size (bytes):36678
                                          Entropy (8bit):2.3150212668003114
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6E28C250768AD90C2B362EDA58D2385A
                                          SHA1:0760B9567680F449D15573A7FA4F498A6DD004A0
                                          SHA-256:A77E6C91D7BF779DF1526AA549B36CA3C8111EB02E0B5252946F8E07CA674CAC
                                          SHA-512:B32331846F21B2737BD9395C29F39D2D6B1C076EBE6C7AFA3C0D8EA3588F279A0115977D773807126F0273641114BC3C9F889C29C2D76203D3B281C153828982
                                          Malicious:false
                                          Reputation:low
                                          Preview:BMF.......6...(...o...m.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 121 x 111 x 24, image size 40404, resolution 3780 x 3780 px/m, cbSize 40458, bits offset 54
                                          Category:dropped
                                          Size (bytes):40458
                                          Entropy (8bit):2.7751718053362007
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:07EF10B4855FBFBFCC768E28616921D9
                                          SHA1:30C86AC411EB125F73B4890BC7D01D181C8AD421
                                          SHA-256:8F6F0277FA7D310270761697C8B962A272BCC4CEC36CBDA8E04F9D092DF653F7
                                          SHA-512:75DF3BEFFDDB130D621955C6DC806B76D5723F550CD477FE27077E1424CC85A206F5FA2E9D999D7C6BE55F2EBB555A811F1472316D5E3C4C515314082DD305E1
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM........6...(...y...o..................................................................................................................................................................................................................................................................................................................................................................................................................................YYTaa\............RQLjjf............JIC...............CC=.................................YYTaa\............RQLjjf............JIC...............CC=..........................................................................................................................................................................................................................}gonX............~|ea`P.........UUS..mfeY........._^W..}POE...............................}gonX............~|ea`P.........UUS..mfeY........._^W..}POE............................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, cbSize 49206, bits offset 54
                                          Category:dropped
                                          Size (bytes):49206
                                          Entropy (8bit):0.8650589244575242
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:32400FE6F9EC049DE9B1DA7E0FF6E655
                                          SHA1:53B6165CE9874249A43D95ED63F92FD2F23F13B2
                                          SHA-256:5BA3269588F3B599D953C22F8E9CCD6FA8B25743234356DF7A4BCE3022661327
                                          SHA-512:1430EA476978831F535DABBE95064DC8FC6ED3C17E975FB268E45739EEE0D2D81177BE713CF1FEC0968FA42A7D0FCA5A7BBDCA78D908B0A64C6223B5CA468A37
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM6.......6...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, cbSize 49206, bits offset 54
                                          Category:dropped
                                          Size (bytes):49206
                                          Entropy (8bit):1.3910838204556586
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BBC1754BFF38C7F3C157ECA916C7FAC9
                                          SHA1:BD70B19546EC907672A81466E5DFF1A92F2D4983
                                          SHA-256:F80EEF1A443797E8781AD35C1EDF94DD8D12AF2B6B9A2614550C6B442189E979
                                          SHA-512:1EFB2A5BAB34D6911C6461F474144C7FCCBB63B21ED5CE7505C5273F1C208C2175F156D7D0593EA75DE69F3A8F689380A3EC885D45725039D23903AAFF580F4E
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM6.......6...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PC bitmap, Windows 3.x format, 128 x 128 x 24, image size 49152, cbSize 49206, bits offset 54
                                          Category:dropped
                                          Size (bytes):49206
                                          Entropy (8bit):1.6103112698791266
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:AB9ADD9F62BB9BE6E07A2E0E879E43B1
                                          SHA1:C58CE2A4D022C690916B8DA6CED0AD23E16E261B
                                          SHA-256:25E83D4D361BEDCF2B4789D805063CB6393E91AC7F851BFFBDC71F402BCAFE60
                                          SHA-512:40326C43D8F6AD6C7C96FC503E7AA6BFF5A3E9E36B42D565BFAFC2897EBE6B886DDAF57EB20CD7940DF226B9DAC101F469F9F703769FFFA01BF07C12BEB20BAB
                                          Malicious:false
                                          Reputation:low
                                          Preview:BM6.......6...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):35840
                                          Entropy (8bit):7.594629005554368
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C92ECC4691932CB98082155806DF9154
                                          SHA1:5C23A756BF3C08356DD6549C1C497BFCAA030EF9
                                          SHA-256:9F0B78531D3941748AF97628EA4DD8061592591CF5EA7A1005D1280AC32ACB4E
                                          SHA-512:3D8AB074E6A37F3017BCE967EB04105B952E3213A78D1DB89348E00C3D9AD66F2961A7B8470F165E20E1BDC5C7FB516B2C28431849EF65F10C4F49C7EB5755F1
                                          Malicious:false
                                          Reputation:low
                                          Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(...*...............................%................................................................................... ...!..."...#...$.......&...'...).......+.......,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...A...B...C...D...........................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7185408
                                          Entropy (8bit):6.870053052766936
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9BD61BF5EBF851EA7815B6358CFBDCE0
                                          SHA1:2F448D4C580ABA06DA38316879FB8042CAEF678B
                                          SHA-256:1F5E3825D2BCDC94433C2FD7A278944A4C000399E93977B815A782B962D21F33
                                          SHA-512:07C5EE7A02F55B4384609603C12CF2F8BC1F45D502CB4130DF278B178871CE6458EC017A5082EF02AEB1632BBCAA045E350C074D9A91439D0ECCB0CE763D2D78
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, Author: Joe Security
                                          • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\RHC.exe, Author: Joe Security
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 89%
                                          • Antivirus: Virustotal, Detection: 90%, Browse
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Reputation:low
                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*......................d...................@...........................n..................@..............................B*........b..................P...............@..!............@......................................................CODE............................... ..`DATA....T........0..................@...BSS......................................idata..B*.......,..................@....tls.........0...........................rdata..9....@......................@..P.reloc.......P......................@..P.rsrc.....b.......b.................@..P....................................@..P........................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):475096
                                          Entropy (8bit):6.650803886605442
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:A7C0883E8F93957EF83A3635C000875A
                                          SHA1:B4A43C5B4552A30606528935940B5CC75445E465
                                          SHA-256:5C4D758854CB73CEF64A91058353265E2889D9463CF0826B1FD7BF7E119D6194
                                          SHA-512:EF3ECA7ACB70FB0E12999FC8823270A161F3D98FB600D8E35B2270BA4559069A9DBA8AD2BE3BD2F2FC1AB54FD6C89707AA83B94F28FA782CE26E029AFDC4C4C6
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$.........cz...)...)...)...)...)...)...)...)...)~..(...)~..(...)~..(...)z~.)...)z~.)...)...(...)...)]..)t..(...)...(...)}..(...)}..(...)}..)...)...)...)}..(...)Rich...)........................PE..L...q.1b...........!.........*............... ...............................`......q.....@..........................).......=....... ............... .......0...+..8...p...............................@............ ..l............................text............................... ..`.rdata...,... ......................@..@.data...,....P.......4..............@....rsrc........ ......................@..@.reloc...+...0...,..................@..B................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):750552
                                          Entropy (8bit):5.713200304546055
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:15C605F3FF6DFC4E788C16C4BAC42F08
                                          SHA1:B0AC9C3C93B08F1549334518681FC34C8E8636D4
                                          SHA-256:130DFAF2DC470092E272641E500F5AEE194A501E0AEF78F2741D28BDFB620EBD
                                          SHA-512:5A5AA59801B7057459252D77EA3AF4463F6D86056C15255274D60D1B1709FA921228B0449D6EA88BEEF59F68631B974AE5CF74952B7140B43A5080307C4495F1
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9Rj.}3..}3..}3..f...l3..f....3..tK..{3...<Y.~3..}3...3..f...!3..f...|3..f...|3..}3..|3..f...|3..Rich}3..................PE..L...;C(W...........!....."..........1p.......................................`......b6....@.........................P...........d....................T..........8V..................................................d................................textbss.L...............................text...X ...`...".................. ..`.rdata..`............&..............@..@.data...t....0......................@....idata..............................@....rsrc...............................@..@.reloc...c.......d..................@..B................................................................................................................................................................................................................................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):8478168
                                          Entropy (8bit):5.760499359431213
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B215EDE974E33E4D1F9D17B3F073576F
                                          SHA1:D1F0DC15499885A06093F8A20BFEAC521F0D507E
                                          SHA-256:7FE703D836F4F45A40A11A3DDF7B68986E1547A0D0FA72B4C30E874DF023D386
                                          SHA-512:90251636FEE57C80A3F903539BD94220E554BEE00BA3390F686BEAE98415BBFA9ED03B42A284BD52EABE1A4896D937A62B6FFFF221192A4812FB56D463F36A8E
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........N.........Yw_....Yw].]..Yw\............-.......................*.....=.......n..z......z........Q......9....z......Rich...................PE..L...qz.Z...........!......j..r........4..................................................@......................... u..x......h....P...Q...........>...........K...Y..8...................pt.......Z..@...........................................textbssyX3..............................text...R~j..p3...j................. ..`.rdata...............j.............@..@.data....N............x.............@....idata..5m......n....x.............@..@.gfids.......@........y.............@..@.giats..!.... ........{.............@..@.tls.........0........{.............@....00cfg.......@........{.............@..@.rsrc....Q...P...R....{.............@..@.reloc...............N|.............@..B................
                                          Process:C:\Program Files\7-Zip\7zG.exe
                                          File Type:Generic INItialization configuration [RS232 Config]
                                          Category:dropped
                                          Size (bytes):2196
                                          Entropy (8bit):5.348080808187057
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9F3080747C827001A53B93561D2A4920
                                          SHA1:F06E8F1A15C0BB18A5C93E90A054BA0EC6F2A5F5
                                          SHA-256:FDC1AE3F9202EC17FB5E90ADB038169F1606DC6959C455D76132740F0C4CC832
                                          SHA-512:C5C4AA9553C28B00984AE2E04B2A447C1B7C14349B48EEE04B96919DAB32122C5D1EC1587DB0810DF53AD7E5EA23E44CAC259B1495721FC3E20A21F2BA0A710E
                                          Malicious:false
                                          Reputation:low
                                          Preview:[RHC Config]..APP MODE..Hub Level Count=3..Hub Number In Group=3..Lock Button=0..Config Hide=0..View Num=1..Update FW=1..Select Flash Level0=1..Select Flash Level1=1..Select Flash Level2=1..Select Flash Level3=0..Enable Random ContainerID=0..Select Efuse Level0=0..Select Efuse Level1=0..Select Efuse Level2=0..Select Efuse Level3=0..Check FW=0..Enable SMBUS=0..External Flash=0..Check CRC=0..Eable DL Old Bin=0..Eable Dual Bank=0..FW Path Level0=C:\Users\123123\Desktop\114A..........\Broway_U3039A_RM1211_HUB123_V03_20230217.bin..FW Path Level1=C:\Users\123123\Desktop\114A..........\Broway_U3039A_RM1211_HUB123_V03_20230217.bin..FW Path Level2=C:\Users\123123\Desktop\114A..........\Broway_U3038A_RM1211_2.4A_HUB3_flash_V03_20230217.bin..FW Path Level3..RHC Port Detail Enable=0..FW Path Deatil Levle0 Port1..FW Path Deatil Levle0 Port2..FW Path Deatil Levle0 Port3..FW Path Deatil Levle0 Port4..FW Path Deatil Levle1 Port1..FW Path Deatil Levle1 Port2..FW Path Deatil Levle1 Port3..FW
                                          Process:C:\Users\user\Downloads\HB-B7C3 upgrade software\HB-B7C3 BUP7 upgrade software\RHC_2010_1.95.0.0_20220311_Sign\32bitrelease\._cache_RHC.exe
                                          File Type:PE32+ executable (native) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):0
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B1A3B819188C976B5EAF3DD10A7EA8C5
                                          SHA1:0D6F87BB6C417EB1260255813B3B67A4641DFD6C
                                          SHA-256:83C49F3EE1BAF8E62BEC2F0A9C0433CFD5E2F53C659F8A621777B1C34EB85803
                                          SHA-512:CD672D1067019AD02A86A08CC7465E25B0F83DBF07D5142728557FF03FDE3CFBBF10E7F406F6F4B976934B91D6B99705C527172B5141B2A5825259DE794F3FD8
                                          Malicious:true
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[...........................................g......g.9....g......Rich...........................PE..d...Z-.a.........."......F.....................@.....................................M....`A................................................T...(............P.......h...$......D....7..8............................7...............0...............................text............................... ..h.rdata..4....0......................@..H.data...P....@......................@....pdata.......P.......2..............@..HPAGE.........`... ...6.............. ..`INIT.................V.............. ..b.rsrc................b..............@..B.reloc..D............f..............@..B................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.31015070358336
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:CCD22840A4E69E098387A7E003A8DC88
                                          SHA1:3A77B80200B0D00B0A2FCA67E2684757688ED625
                                          SHA-256:94D75A16F6D626090EE2C639796C02AF94F2B46F4F6E2740ACF3C0CE9F2A0BF0
                                          SHA-512:76DDB1CA25FFE9294AFD162D8C37F1E34896D3457471406DBEF2F8ECB9CF96922B8B58D39B4ED8803BBA70F6916926264C4309B5D1D1B790AE1BBF0D8AAD74FC
                                          Malicious:false
                                          Reputation:low
                                          Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..$U.U...............................................................................................................................................................................................................................................................................................................................................b1a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (6463), with no line terminators
                                          Category:downloaded
                                          Size (bytes):6463
                                          Entropy (8bit):4.937288419449677
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D51795D11083C249CC3661EE92D5E4D8
                                          SHA1:2B0E75F6C1F272AD5E6F76916434CC911FA5A12D
                                          SHA-256:EC7EB19422058571B43826077535B25347A96C151AEFA5B338B3D15930EBF58D
                                          SHA-512:08D42429461FA38F2D6CA6A3396FE4B7AF927699227FE4FDE9B9764A206715EB2F3803FD209FA7FD22B1D52F3441791E883886815F6D58B54BF8E5AA75E2F395
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/third-party/magnific-popup.min.css?ver=0.9.7
                                          Preview:.mfp-bg{top:0;left:0;width:100%;height:100%;z-index:1042;overflow:hidden;position:fixed;background:#111;opacity:.73}.mfp-wrap{top:0;left:0;width:100%;height:100%;z-index:1043;position:fixed;outline:none!important;-webkit-backface-visibility:hidden}.mfp-container{text-align:center;position:absolute;width:100%;height:100%;left:0;top:0;padding:0 30px;-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}.mfp-container:before{content:'';display:inline-block;height:100%;vertical-align:middle}.mfp-align-top .mfp-container:before{display:none}.mfp-content{position:relative;display:inline-block;vertical-align:middle;margin:0 auto;text-align:left;z-index:1045}.mfp-inline-holder .mfp-content,.mfp-ajax-holder .mfp-content{width:100%;cursor:auto}.mfp-ajax-cur{cursor:progress}.mfp-zoom{cursor:pointer;cursor:-webkit-zoom-in;cursor:-moz-zoom-in;cursor:zoom-in}.mfp-auto-cursor .mfp-content{cursor:auto}.mfp-close,.mfp-arrow,.mfp-preloader,.mfp-counter{-webkit-user-select:none;-
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Unicode text, UTF-8 text, with very long lines (893)
                                          Category:downloaded
                                          Size (bytes):12824
                                          Entropy (8bit):5.397107601043651
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:169B699ABA9381B92C837AF0CC07E834
                                          SHA1:E900EEA6646FC314C07E710A2C353CF38EE277A1
                                          SHA-256:BACC65FADBF1E3705E8D7DB775B74A765DE8BCA204CA248B7CDBBCA37DEB4503
                                          SHA-512:2FB5863E0785C5997F62D789FF52CF6788F78590AB11A41B3503E37B8D5515071CAB19981E8870F621E641374028E1B37E5C0A6F6237E19665801CE06C3CAF0E
                                          Malicious:false
                                          Reputation:low
                                          URL:https://downloads.sabrent.com/cdn-cgi/apps/head/7Urk1JmloTAnH96Ql77qNavbYV0.js
                                          Preview:;window.CloudflareApps=window.CloudflareApps||{};CloudflareApps.siteId="0932f0d6ecaaefcfd8bff879839ec978";CloudflareApps.installs=CloudflareApps.installs||{};;(function(){'use strict'.CloudflareApps.internal=CloudflareApps.internal||{}.var errors=[].CloudflareApps.internal.placementErrors=errors.var errorHashes={}.function noteError(options){var hash=options.selector+'::'+options.type+'::'+(options.installId||'').if(errorHashes[hash]){return}.errorHashes[hash]=true.errors.push(options)}.var initializedSelectors={}.var currentInit=false.CloudflareApps.internal.markSelectors=function markSelectors(){if(!currentInit){check().currentInit=true.setTimeout(function(){currentInit=false})}}.function check(){var installs=window.CloudflareApps.installs.for(var installId in installs){if(!installs.hasOwnProperty(installId)){continue}.var selectors=installs[installId].selectors.if(!selectors){continue}.for(var key in selectors){if(!selectors.hasOwnProperty(key)){continue}.var hash=installId+'::'+key
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (4112)
                                          Category:downloaded
                                          Size (bytes):31697
                                          Entropy (8bit):5.654568871461728
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:FC329C7A531D9D67D9E0FD2BE21C43BA
                                          SHA1:906FAEC81641855361DAE209690966300D5BA2D2
                                          SHA-256:DEBB9B7AFA35D08B328C5EDCF065AEE5BF338350E67234E7AC9EF4893E13C1BC
                                          SHA-512:8231BCF7004C6C55247686169723C5E063193FA637C65BFD904CF4AAD201FFA5872AF7294A1104685FF8D2EABEAE827DD3ACE45A47187E7113DD9D13BAEAE2B2
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/js/front.js?ver=6.3.1
                                          Preview:var allps,pss;var wpdm_pass_target='#pps_z';String.prototype.wpdm_shuffle=function(){var a=this.split(""),n=a.length;for(var i=n-1;i>0;i--){var j=Math.floor(Math.random()*(i+1));var tmp=a[i];a[i]=a[j];a[j]=tmp;}.return a.join("");}.String.prototype.wpdm_hash=function(){if(Array.prototype.reduce){return this.split("").reduce(function(a,b){a=((a<<5)-a)+b.charCodeAt(0);return a&a},0);}.var hash=0;if(this.length===0)return hash;for(var i=0;i<this.length;i++){var character=this.charCodeAt(i);hash=((hash<<5)-hash)+character;hash=hash&hash;}.return hash;}.var WPDM={init:function($){},copy:function($id){var copyText=document.getElementById($id);copyText.select();copyText.setSelectionRange(0,99999);document.execCommand("copy");WPDM.notify('<i class="fa fa-check-double"></i> Copied','success','top-center',1000);},copyTxt:function(textToCopy){WPDM.notify('<i class="fa fa-check-double"></i> Copied','success','top-center',1000);if(navigator.clipboard&&window.isSecureContext){return navigator.clipbo
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Web Open Font Format (Version 2), TrueType, length 15860, version 1.0
                                          Category:downloaded
                                          Size (bytes):15860
                                          Entropy (8bit):7.988022700476719
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:E9F5AAF547F165386CD313B995DDDD8E
                                          SHA1:ACDEF5603C2387B0E5BFFD744B679A24A8BC1968
                                          SHA-256:F5AEBDFEA35D1E7656EF4ACC5DB1F243209755AE3300943EF8FC6280F363C860
                                          SHA-512:2A71EDB5490F286642A874D52A1969F54282BC43CB24E8D5A297E13B320321FB7B7AF5524EAC609CF5F95EE08D5E4EC5803E2A3C8D13C09F6CC38713C665D0CE
                                          Malicious:false
                                          Reputation:low
                                          URL:https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlfBBc4.woff2
                                          Preview:wOF2......=...........=..........................d.....^.`.. .H..<........8........6.$.... ..~. ..)..~E......6..J..`.. :.....8.;..5......!.l.j.%SX.SDm...RXh...&.X......5..._...............@...8...Gi..g.;9..'.Q......1..5.U.....w.+.hn..........c.....5.#{..%.#.JP*..i.J..U(.6.D5V.<"Ex6"...k..[..{.?.d2....{.........*W.......S...hT,.l..'.9.;[@..._.L..|+...)......S...9F......T..t...-=X.:FtZ..uZ.[.?..f<.....@.....'...I...e..........8.?..-R.3,%X...I2|.Wk{i...V2C....H$.H.LH.{.........(...6U..%W[t.R....j.........iS..%..L....rf.=..7..9i.I...1.Mj..C..u.B.........vJ.....+.u$.=..3..T..R.._.gs...6).$.-.PUH..Hl....WDd.......fK.(B.F1>..5.._[..]}VA#X...c.....%.(s50...m...^...1...'.$U*H.t...H...s.AZu...'...8.p...@.@.....q..Y.#.....#.....G.....G@..o8. A........:.........S.:..N.S.j.....tav.}.9h..s.....he.......{,~k...,eK.z}.......5%G...l.uCK.....V..............m.....U}.Sz..Z.c.{.....:..g......>h..'|Z........a....^.b...o.>...g........f../w'....Ja.o(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (529), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):3071
                                          Entropy (8bit):5.194468386945858
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:7A1EA078F003D08E6A2DE67FD7E433FC
                                          SHA1:5C4E810EC38001B6BA263FF8136A0C1CC7DA519A
                                          SHA-256:5F4DA1ADA401D4247100C51704A30A33581B6FA981CCC556182AC66C9F683059
                                          SHA-512:109A73A59E7B3338375138DA6413C62398225B42F43EB27C7463AE8E2ACA2FC684233B86AF60C7D31B55DF2C0CE17364FA14D76CBB42C38F9474DD95B7FE3E44
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/nm-blog.min.js?ver=2.6.8
                                          Preview:/* NM: Blog script */..(function(b){b.extend(b.nmTheme,{blog_init:function(){var a=this;a.$blogList=b("#nm-blog-list");b("#nm-blog-categories-toggle-link").on("click",function(e){e.preventDefault();var d=b(this);b("#nm-blog-categories-list").slideToggle(200,function(){var f=b(this);d.toggleClass("active");d.hasClass("active")||f.css("display","")})});a.$window.on("load",function(){a.$pageIncludes.hasClass("blog-masonry")&&b("#nm-blog-list").masonry({itemSelector:".post",gutter:0,hiddenStyle:{},visibleStyle:{}})});a.$blogList&&..a.blogInfLoadBind()},blogInfLoadBind:function(){var a=this;a.$blogPaginationWrap=b("#nm-blog-pagination");a.$blogInfLoadWrap=b("#nm-blog-infinite-load");if(a.$blogInfLoadWrap.length)if(a.$blogInfLoadLink=a.$blogInfLoadWrap.children("a"),a.infloadScroll=a.$blogPaginationWrap.hasClass("scroll-mode")?!0:!1,a.infloadScroll){a.infscrollLock=!1;var e,d=Math.round(a.$document.height()-a.$blogPaginationWrap.offset().top),f=parseInt(nm_wp_vars.infloadBufferBlog),c=null;a
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (957), with no line terminators
                                          Category:downloaded
                                          Size (bytes):957
                                          Entropy (8bit):4.626221325795706
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0F6A7B4AFB57559E8F26D3B45FC2EFC4
                                          SHA1:14DADEC8FE85862BFE04FBDCF62C27B1C9EAAE83
                                          SHA-256:555666B22530324690D645445978E04087332411DB0EB502295B5D6CBAE14A61
                                          SHA-512:8D44633E64508D970DE459DC37F43733DB486BB22922E2D7DD70DA8CBC7C94C0245BB66F4E285DDE111C4C433B8DD29031B62CBE2155A96BEFC34B9A9EE0F742
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/third-party/slick.min.css?ver=1.5.5
                                          Preview:.slick-slider{position:relative;display:block;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;-khtml-user-select:none;-ms-touch-action:pan-y;touch-action:pan-y;-webkit-tap-highlight-color:transparent}.slick-list{position:relative;display:block;overflow:hidden;margin:0;padding:0}.slick-list:focus{outline:0}.slick-list.dragging{cursor:pointer;cursor:hand}.slick-track{position:relative;top:0;left:0;display:block}.slick-track:after,.slick-track:before{display:table;content:''}.slick-track:after{clear:both}.slick-loading .slick-track{visibility:hidden}.slick-slide{display:none;float:left;height:100%;min-height:1px}[dir=rtl] .slick-slide{float:right}.slick-slide img{display:block}.slick-slide.slick-loading img{display:none}.slick-slide.dragging img{pointer-events:none}.slick-initialized .slick-slide{display:block}.slick-loading .slick-slide{visibility:hidden}.slick-vertical .slick-slide{display:block;height:auto}
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (3149), with no line terminators
                                          Category:downloaded
                                          Size (bytes):3149
                                          Entropy (8bit):4.886980063109934
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:1F1B4A899B3A3A35FE741E03042FF2D3
                                          SHA1:0DC654F1F8BCC9AC9D43519584778E411BB28F4D
                                          SHA-256:F69AE61EF026E450496FAEDF16BCD30F1E87B0EA19743B8EE954B31E24277825
                                          SHA-512:F2B219A562A4D397C367839CB2647C45D627393C6F3D7695F87241794110881AD938CB1A636FE174251E86FC0C08EF17E19905BCBCEFA03F670859BF0B51A9A4
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/third-party/slick-theme.min.css?ver=1.5.5
                                          Preview:.slick-slider>div,.slick-slider>li{display:none}.slick-slider>div:first-child,.slick-slider>li:first-child{display:block}.slick-slider.slick-initialized>div,.slick-slider.slick-initialized>li,.slick-slider.slick-loading>div,.slick-slider.slick-loading>li{display:block}.slick-next,.slick-prev{display:block;position:absolute;z-index:1000;top:50%;color:#111;opacity:0;width:28px;height:128px;margin-top:-64px;padding:0;border:none;outline:0;cursor:pointer;background:0 0;-webkit-transition:all .2s ease;transition:all .2s ease}.slick-prev{left:-10px}.slick-next{right:-10px}.slick-vertical .slick-next,.slick-vertical .slick-prev{left:50%;margin-top:0;margin-left:-10px}.slick-vertical .slick-prev{top:-28px}.slick-vertical .slick-next{top:auto;bottom:-38px}.slick-slider:hover .slick-prev{left:3%;opacity:1}.slick-slider:hover .slick-next{right:3%;opacity:1}.slick-next:hover,.slick-prev:hover{color:#a1a1a1}.slick-controls-light .slick-next,.slick-controls-light .slick-next:hover,.slick-controls-li
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:downloaded
                                          Size (bytes):89879
                                          Entropy (8bit):4.9761019208336394
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D524E517C463B2C82315FB5C580EBC30
                                          SHA1:525AE98E9203D045B800625D2E84FF41E0DA3885
                                          SHA-256:1B02CADE27983BE264C969360566107D6198AAD84BCC7CC3610545C6C8FC604C
                                          SHA-512:B9F83F2A09FE9DE168E9F1FE1FA42F792EBBA37D9BBDDA6D3C32779CAD420015A080A766BC8D3627EE482BF7892F6B5F9F395A3A012E28C2AA52BA44208F00D3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/style.css?ver=2.6.8
                                          Preview:a,abbr,address,article,aside,audio,b,blockquote,body,canvas,caption,center,cite,code,dd,del,div,dl,dt,em,embed,fieldset,figcaption,figure,footer,form,h1,h2,h3,h4,h5,h6,header,hgroup,hr,html,i,iframe,img,ins,label,legend,li,menu,nav,object,ol,output,p,pre,q,section,small,span,strike,strong,sub,summary,sup,table,tbody,td,tfoot,th,thead,time,tr,tt,u,ul,var,video{margin:0;padding:0;border:0}html{height:100%}b,strong{font-weight:700;font-weight:900}img{font-size:0;color:transparent;max-width:100%;height:auto;vertical-align:bottom}li{list-style:none}table{border-collapse:collapse;border-spacing:0}th,td,caption{font-weight:inherit;vertical-align:top;text-align:left}small{font-size:75%}p:empty{display:none!important}*,*:after,*:before{-webkit-box-sizing:border-box;box-sizing:border-box;-webkit-font-smoothing:antialiased;font-smoothing:antialiased}.nm-preload *{-webkit-transition:none!important;transition:none!important}.fl-right{float:right}.fl-left{float:left}.clear:before,.clear:after,.clear
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (2946)
                                          Category:downloaded
                                          Size (bytes):2981
                                          Entropy (8bit):5.174465669703351
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:492F2C1A7EA7EB83FE42E0FF7CB51AA2
                                          SHA1:DB36A77F6AAA2063BFBEC02C2C0E967438C5A245
                                          SHA-256:E174A58A503AB84B3D1B9DE12FD3895788204485170F1289E445F7B5B98EC789
                                          SHA-512:EEE6A1C268A519F4F281B2D76B5193BB068E94D1410372EF062587888589E139B20BB635E2331E97C857D7D835E9372F50822C5DAED29B139AB91FF5633C7A7F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-includes/js/comment-reply.min.js?ver=6.4.3
                                          Preview:/*! This file is auto-generated */.window.addComment=function(v){var I,C,h,E=v.document,b={commentReplyClass:"comment-reply-link",commentReplyTitleId:"reply-title",cancelReplyId:"cancel-comment-reply-link",commentFormId:"commentform",temporaryFormId:"wp-temp-form-div",parentIdFieldId:"comment_parent",postIdFieldId:"comment_post_ID"},e=v.MutationObserver||v.WebKitMutationObserver||v.MozMutationObserver,r="querySelector"in E&&"addEventListener"in v,n=!!E.documentElement.dataset;function t(){d(),e&&new e(o).observe(E.body,{childList:!0,subtree:!0})}function d(e){if(r&&(I=g(b.cancelReplyId),C=g(b.commentFormId),I)){I.addEventListener("touchstart",l),I.addEventListener("click",l);function t(e){if((e.metaKey||e.ctrlKey)&&13===e.keyCode)return C.removeEventListener("keydown",t),e.preventDefault(),C.submit.click(),!1}C&&C.addEventListener("keydown",t);for(var n,d=function(e){var t=b.commentReplyClass;e&&e.childNodes||(e=E);e=E.getElementsByClassName?e.getElementsByClassName(t):e.querySelectorA
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (7298), with no line terminators
                                          Category:downloaded
                                          Size (bytes):7298
                                          Entropy (8bit):5.777356795249259
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BA04FCCC1CC1846CADC2DC0A2BAC77AA
                                          SHA1:1CC45B8C406CE39CE5E8DD35A477D36E465072FB
                                          SHA-256:9340A9B111932971B02E2366E3A6B95C4CAACED6EF035AD9477DBAD43202F79C
                                          SHA-512:5D5FD18A981EC8FEA99066412074A2BC0F0A725855F535329E94015AC2895BA9875DAB556F41F5370611CB0498C797E6290ACDAA176605C6D9AFAD3749183A6D
                                          Malicious:false
                                          Reputation:low
                                          URL:https://downloads.sabrent.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/24864818/main.js
                                          Preview:window._cf_chl_opt={cFPWv:'b'};~function(R,g,h,i,n,o){R=b,function(c,e,Q,f,y){for(Q=b,f=c();!![];)try{if(y=parseInt(Q(309))/1+-parseInt(Q(361))/2+-parseInt(Q(331))/3+parseInt(Q(360))/4*(parseInt(Q(338))/5)+parseInt(Q(299))/6*(parseInt(Q(298))/7)+-parseInt(Q(350))/8+parseInt(Q(380))/9,e===y)break;else f.push(f.shift())}catch(z){f.push(f.shift())}}(a,142845),g=this||self,h=g[R(348)],i=function(S,e,f,y){return S=R,e=String[S(320)],f={'h':function(z){return null==z?'':f.g(z,6,function(A,T){return T=b,T(375)[T(371)](A)})},'g':function(z,A,B,U,C,D,E,F,G,H,I,J,K,L,M,N,O,P){if(U=S,null==z)return'';for(D={},E={},F='',G=2,H=3,I=2,J=[],K=0,L=0,M=0;M<z[U(311)];M+=1)if(N=z[U(371)](M),Object[U(389)][U(308)][U(340)](D,N)||(D[N]=H++,E[N]=!0),O=F+N,Object[U(389)][U(308)][U(340)](D,O))F=O;else{if(Object[U(389)][U(308)][U(340)](E,F)){if(256>F[U(359)](0)){for(C=0;C<I;K<<=1,L==A-1?(L=0,J[U(304)](B(K)),K=0):L++,C++);for(P=F[U(359)](0),C=0;8>C;K=1.91&P|K<<1,L==A-1?(L=0,J[U(304)](B(K)),K=0):L++,P>>=1,C++);}el
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (800)
                                          Category:downloaded
                                          Size (bytes):2511
                                          Entropy (8bit):5.576894359762676
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C7EF9E0B4257C771A8A7D2613D73EA29
                                          SHA1:C06E50540FF74A64763754A9CF81BC18B474119C
                                          SHA-256:CDFCCDA5AFE74E7C85D10D1D3F4D9258A3150337C58805FFCEAD49B3E2363102
                                          SHA-512:FE388868681DF5809FAEFE3C7A5A7515B1C1418F6B2B9BF9D550E9FDC4EE93B049292372FD32FC26A8078D3F3E9328B4F5E5F56461C355F1602655551C600D60
                                          Malicious:false
                                          Reputation:low
                                          URL:https://downloads.sabrent.com/cdn-cgi/apps/body/EbKEO2qLifsmwScwkxGwMTUXRMk.js
                                          Preview:;if(CloudflareApps.matchPage(CloudflareApps.installs['q5MM4j3WpYBd'].URLPatterns)){(function(){'use strict'.if(!window.addEventListener)return.if(window.frameElement)return.var options=CloudflareApps.installs['q5MM4j3WpYBd'].options.var element.function getMaxZIndex(){var max=0.var elements=document.getElementsByTagName('*').Array.prototype.slice.call(elements).forEach(function(element){var zIndex=parseInt(document.defaultView.getComputedStyle(element).zIndex,10).max=zIndex?Math.max(max,zIndex):max}).return max}.function hideAlert(e){e.preventDefault().element.style.display='none'.document.cookie='coockiless=1; expires=Thu, 18 Dec 2050 12:00:00 UTC'.if(localStorage){localStorage.coockiless=1}}.function updateElement(){if(localStorage&&localStorage.coockiless)return.element=CloudflareApps.createElement({selector:'body',method:'append'},element).element.setAttribute('app','cookiless').element.style.zIndex=getMaxZIndex()+1.var ckElement=document.createElement('cookiless-div').ckElement.cl
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (484), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):660
                                          Entropy (8bit):5.059947650197564
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3197C02080C074227E9A14AD7F3233E9
                                          SHA1:5A7BEB6FD89F488D4CEFC075C95484EF0213C1D7
                                          SHA-256:90ACD202AC9A28F2D9558B006E46D9FC0EB5877579C2A46DBA3B3AE5C022FB54
                                          SHA-512:84E6D4E325E067D8EAF363C61BD7542F920C91A0BA6A773223C6A3DC60BCEFA4F01970EC73BD7C5A75014E50037C79951F2BBA9DE3D1CDACB6B58C7B08F0A2F9
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/plugins/jquery.smartscroll.min.js?ver=1.0
                                          Preview:/* smartscroll: debounced scroll event for jQuery * https://github.com/lukeshumard/smartscroll * Copyright 2011 Louis-Remi & Luke Shumard * Licensed under the MIT license. */..(function(g,a,h){var b=a.event,c;b.special.smartscroll={setup:function(){a(this).on("scroll",b.special.smartscroll.handler)},teardown:function(){a(this).off("scroll",b.special.smartscroll.handler)},handler:function(d,b){var e=this,f=arguments;d.type="smartscroll";c&&clearTimeout(c);c=setTimeout(function(){a(e).trigger("smartscroll",f)},"execAsap"===b?0:100)}};a.fn.smartscroll=function(a){return a?this.on("smartscroll",a):this.trigger("smartscroll",["execAsap"])}})(window,jQuery);
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (19986), with no line terminators
                                          Category:downloaded
                                          Size (bytes):19986
                                          Entropy (8bit):5.253227111919225
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:DD1D068FDB5FE90B6C05A5B3940E088C
                                          SHA1:0D96F9DF8772633A9DF4C81CF323A4EF8998BA59
                                          SHA-256:6153D13804862B0FC1C016CF1129F34CB7C6185F2CF4BF1A3A862EECDAB50101
                                          SHA-512:7AEA051A8C2195A2EA5EC3D6438F2A4A4052085B370CF4728B056EDC58D1F7A70C3F1F85AFE82959184869F707C2AC02A964B8D9166122E74EBC423E0A47FA30
                                          Malicious:false
                                          Reputation:low
                                          URL:https://static.cloudflareinsights.com/beacon.min.js/v84a3a4012de94ce1a686ba8c167c359c1696973893317
                                          Preview:!function(){var e={343:function(e){"use strict";for(var t=[],n=0;n<256;++n)t[n]=(n+256).toString(16).substr(1);e.exports=function(e,n){var r=n||0,i=t;return[i[e[r++]],i[e[r++]],i[e[r++]],i[e[r++]],"-",i[e[r++]],i[e[r++]],"-",i[e[r++]],i[e[r++]],"-",i[e[r++]],i[e[r++]],"-",i[e[r++]],i[e[r++]],i[e[r++]],i[e[r++]],i[e[r++]],i[e[r++]]].join("")}},944:function(e){"use strict";var t="undefined"!=typeof crypto&&crypto.getRandomValues&&crypto.getRandomValues.bind(crypto)||"undefined"!=typeof msCrypto&&"function"==typeof window.msCrypto.getRandomValues&&msCrypto.getRandomValues.bind(msCrypto);if(t){var n=new Uint8Array(16);e.exports=function(){return t(n),n}}else{var r=new Array(16);e.exports=function(){for(var e,t=0;t<16;t++)0==(3&t)&&(e=4294967296*Math.random()),r[t]=e>>>((3&t)<<3)&255;return r}}},508:function(e,t,n){"use strict";var r=n(944),i=n(343);e.exports=function(e,t,n){var o=t&&n||0;"string"==typeof e&&(t="binary"===e?new Array(16):null,e=null);var a=(e=e||{}).random||(e.rng||r)();if(
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65297)
                                          Category:downloaded
                                          Size (bytes):80650
                                          Entropy (8bit):5.261756767513338
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:50703EBFC29F534AD6E432826F1C25E3
                                          SHA1:F19941F9FD95E8A9BDF9DB599BB3D8714D41465A
                                          SHA-256:4D371899ABA195B1F0CBA3A70DE300FB5B327A322CFBE3A30D77AF8456D8494E
                                          SHA-512:663C83D63C78A66E169B78F4F77148DBA460CB3F2BE34E4B2EF6106E6B44AB813A886F12E936F9A42080C71EABF8BEE67743D508B97E0B38419AF75E6F87EC2F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/bootstrap/js/bootstrap.bundle.min.js?ver=6.4.3
                                          Preview:/*!. * Bootstrap v4.4.1 (https://getbootstrap.com/). * Copyright 2011-2019 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports,require("jquery")):"function"==typeof define&&define.amd?define(["exports","jquery"],t):t((e=e||self).bootstrap={},e.jQuery)}(this,function(e,p){"use strict";function i(e,t){for(var n=0;n<t.length;n++){var i=t[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(e,i.key,i)}}function s(e,t,n){return t&&i(e.prototype,t),n&&i(e,n),e}function t(t,e){var n=Object.keys(t);if(Object.getOwnPropertySymbols){var i=Object.getOwnPropertySymbols(t);e&&(i=i.filter(function(e){return Object.getOwnPropertyDescriptor(t,e).enumerable})),n.push.apply(n,i)}return n}function l(o){for(var e=1;e<arguments.length;e++){var r=null!=arguments[e]?argumen
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (1711), with no line terminators
                                          Category:downloaded
                                          Size (bytes):1711
                                          Entropy (8bit):4.866817530324133
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:11E54B0AF33D625022F380A3F6540F27
                                          SHA1:1584A8091C2DC6BEF31A29D99DE4AB4F1360EF24
                                          SHA-256:E99C5D0C2184E22458B53C49C9B2BADCDE263B3C571BEDBCD3C7CEAE9C45A53A
                                          SHA-512:EEC3825BC7A6355B2525E4065B43492E0F5B96FF7FA679F3595F4043564D974EBC2A3989FE79E8C436DB1D87892935AFB84269418C5C38D9656A2222403E9B63
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/third-party/normalize.min.css?ver=3.0.2
                                          Preview:html{line-height:1.15;-webkit-text-size-adjust:100%}body{margin:0}main{display:block}h1{font-size:2em;margin:.67em 0}hr{box-sizing:content-box;height:0;overflow:visible}pre{font-family:monospace,monospace;font-size:1em}a{background-color:transparent}abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}code,kbd,samp{font-family:monospace,monospace;font-size:1em}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sub{bottom:-.25em}sup{top:-.5em}img{border-style:none}button,input,optgroup,select,textarea{font-family:inherit;font-size:100%;line-height:1.15;margin:0}button,input{overflow:visible}button,select{text-transform:none}[type=button],[type=reset],[type=submit],button{-webkit-appearance:button}[type=button]::-moz-focus-inner,[type=reset]::-moz-focus-inner,[type=submit]::-moz-focus-inner,button::-moz-focus-inner{border-style:none;padding:0}[type=button]:-moz-focusring,[type=reset]:-moz-focusring,[type=
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text
                                          Category:downloaded
                                          Size (bytes):4540
                                          Entropy (8bit):5.396267137178851
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0D09CC7E9425E82E7EAF394FA7D1EF93
                                          SHA1:BAE208ADF079D3BB4D302D8981AEC9821A90786A
                                          SHA-256:2D0922BD18F06DF3C7413FCD6A3F1C5EC9545B4B07B131E362F30DF7275FC058
                                          SHA-512:B7BE44D75B926215A076B61702FD94825B5267E1C7FA2E7275A6A0CF48EA429F2215E5467A26A82978D066B69B15E7C4B08B0FB3844FC552E318AAEDC7A6E06B
                                          Malicious:false
                                          Reputation:low
                                          URL:"https://fonts.googleapis.com/css?family=Roboto:400,700&display=swap&ver=1648148041"
                                          Preview:/* cyrillic-ext */.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu72xKOzY.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu5mxKOzY.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu7mxKOzY.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. font-display: swap;. src: url(https://fonts.gstatic.com/s
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65317)
                                          Category:downloaded
                                          Size (bytes):101784
                                          Entropy (8bit):4.782151974036875
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6CB5A85B30082E3D59D7E371E002CE8D
                                          SHA1:0C639634F474B4601A7937F440096185F3A9D8D3
                                          SHA-256:01B035EFB5DFA529C512F82962ED633328222DA6F33C224244806D4798C67349
                                          SHA-512:C61E8EFC2910A0F3960DD6130EA79174F0957754A9BC203D5D77149D94B616624DA75728005CEFB4237D0666A613EE1A1CAF32C941D44827091E05E5A13C93D8
                                          Malicious:false
                                          Reputation:low
                                          URL:https://use.fontawesome.com/releases/v6.2.0/css/all.css?ver=6.4.3
                                          Preview:/*!. * Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com. * License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License). * Copyright 2022 Fonticons, Inc.. */..fa{font-family:var(--fa-style-family,"Font Awesome 6 Free");font-weight:var(--fa-style,900)}.fa,.fa-brands,.fa-classic,.fa-regular,.fa-sharp,.fa-solid,.fab,.far,.fas{-moz-osx-font-smoothing:grayscale;-webkit-font-smoothing:antialiased;display:var(--fa-display,inline-block);font-style:normal;font-variant:normal;line-height:1;text-rendering:auto}.fa-classic,.fa-regular,.fa-solid,.far,.fas{font-family:"Font Awesome 6 Free"}.fa-brands,.fab{font-family:"Font Awesome 6 Brands"}.fa-1x{font-size:1em}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-6x{font-size:6em}.fa-7x{font-size:7em}.fa-8x{font-size:8em}.fa-9x{font-size:9em}.fa-10x{font-size:10em}.fa-2xs{font-size:.625em;line-height:.1em;vertical-align:.225em}.fa-xs{font-size:.75em;line-
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, ASCII text, with very long lines (3154), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):3329
                                          Entropy (8bit):5.329991170892036
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:3EDE941080F7F0F47B92F7F480F85E38
                                          SHA1:70AAB97D60682D3823641DCDA3D8E18DFC59C612
                                          SHA-256:2C766AA3C79A45DE31E1D55C25EBEA682C1138E9029BE4A2DE3F52AA7F0DBBF4
                                          SHA-512:9F2B5817F30EB67CB4FC9F5D936C90B11FB65ED150AFAD56469F133ED35ABE306F9FD7803984F52726FF43B9CFB341D57F8DF4EC5F6A721C13FE30CE6E4FDE58
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/plugins/modernizr.min.js?ver=2.8.3
                                          Preview:/* Modernizr 2.8.3 (Custom Build) | MIT & BSD - Build: http://modernizr.com/download/#-cssanimations-csstransforms-csstransforms3d-csstransitions-history-touch-cssclasses */..;window.Modernizr=function(a,b,c){function z(a){j.cssText=a}function A(a,b){return z(m.join(a+";")+(b||""))}function B(a,b){return typeof a===b}function C(a,b){return!!~(""+a).indexOf(b)}function D(a,b){for(var d in a){var e=a[d];if(!C(e,"-")&&j[e]!==c)return b=="pfx"?e:!0}return!1}function E(a,b,d){for(var e in a){var f=b[a[e]];if(f!==c)return d===!1?a[e]:B(f,"function")?f.bind(d||b):f}return!1}function F(a,b,c){var d=a.charAt(0).toUpperCase()+a.slice(1),e=(a+" "+o.join(d+" ")+d).split(" ");return B(b,"string")||B(b,"undefined")?D(e,b):(e=(a+" "+p.join(d+" ")+d).split(" "),E(e,b,c))}var d="2.8.3",e={},f=!0,g=b.documentElement,h="modernizr",i=b.createElement(h),j=i.style,k,l={}.toString,m=" -webkit- -moz- -o- -ms- ".split(" "),n="Webkit Moz O ms",o=n.split(" "),p=n.toLowerCase().split(" "),q={},r={},s={},t=[],u=t.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (604), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):24107
                                          Entropy (8bit):5.274360110435725
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F3088C6A89938B08121649CEC673E5AB
                                          SHA1:81E7C0320E48A9D690867D8A08AD84A9EC67C84F
                                          SHA-256:52F2A8B3DC9D12C15AC5B578686FB2CB905693AA022D1067E7EDF8F6B1FB52B9
                                          SHA-512:5712ABD4BBA912D602D88604185B3D82C714060B7436E62CF7A39E54A959738196CE358ED67FAA6F833A8AFFFEDD119A0D0EB82DAEC38910F27D7151FAEBA2E2
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/nm-core.min.js?ver=2.6.8
                                          Preview:/* NM: Core script */..(function(b){function n(){this.init()}b.nmThemeExtensions||(b.nmThemeExtensions={});n.prototype={init:function(){var a=this;a.classHeaderFixed="header-on-scroll";a.classMobileMenuOpen="mobile-menu-open";a.classSearchOpen="header-search-open";a.classWidgetPanelOpen="widget-panel-open";a.$window=b(window);a.$document=b(document);a.$html=b("html");a.$body=b("body");a.$pageIncludes=b("#nm-page-includes");a.$pageOverlay=b("#nm-page-overlay");a.$topBar=b("#nm-top-bar");a.$header=b("#nm-header");a.$headerPlaceholder=..b("#nm-header-placeholder");a.headerScrollTolerance=0;a.$mobileMenuBtn=b("#nm-mobile-menu-button");a.$mobileMenu=b("#nm-mobile-menu");a.$mobileMenuScroller=a.$mobileMenu.children(".nm-mobile-menu-scroll");a.$mobileMenuLi=a.$mobileMenu.find("ul li.menu-item");a.$widgetPanel=b("#nm-widget-panel");a.widgetPanelAnimSpeed=250;a.panelsAnimSpeed=200;a.$shopWrap=b("#nm-shop");a.isShop=a.$shopWrap.length?!0:!1;a.shopCustomSelect="0"!=nm_wp_vars.shopCustomSelect?!0:
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65502)
                                          Category:downloaded
                                          Size (bytes):105639
                                          Entropy (8bit):5.248186152369257
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0CE18F9CA64E6FDCAC07EC7E97DAC4C7
                                          SHA1:603AF3E02F381A658F135EB80F4EEF78CC7E750D
                                          SHA-256:D1A7F655B0B8BE63EC6BC38B04028198BA32B8AAB86C194A2B628E80C59ACA2A
                                          SHA-512:29B375FC71837E0090F63792B3C3B8B7725EAB61B1BF6E0A4D6BDE37D40AAE4FFCE1C9B97E953C6A7928B93E4DB1AD4F9B1E123571D98486AFC183269DBF721E
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/fancybox/fancybox.umd.js?_=1706791788948
                                          Preview:// @fancyapps/ui/Fancybox v4.0.31.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports):"function"==typeof define&&define.amd?define(["exports"],e):e((t="undefined"!=typeof globalThis?globalThis:t||self).window=t.window||{})}(this,(function(t){"use strict";function e(t,e){var i=Object.keys(t);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(t);e&&(n=n.filter((function(e){return Object.getOwnPropertyDescriptor(t,e).enumerable}))),i.push.apply(i,n)}return i}function i(t){for(var i=1;i<arguments.length;i++){var n=null!=arguments[i]?arguments[i]:{};i%2?e(Object(n),!0).forEach((function(e){r(t,e,n[e])})):Object.getOwnPropertyDescriptors?Object.defineProperties(t,Object.getOwnPropertyDescriptors(n)):e(Object(n)).forEach((function(e){Object.defineProperty(t,e,Object.getOwnPropertyDescriptor(n,e))}))}return t}function n(t){return n="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(t){return typeof t}:function(t){return t&&"function
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
                                          Category:downloaded
                                          Size (bytes):21563
                                          Entropy (8bit):7.930107038464285
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:82CB7F6785DE02B0178D6E8C82482C90
                                          SHA1:894F81F42AD70246545C26CC24E650F537EC438F
                                          SHA-256:AB0E5907C20D717AD2E8456032C5338EA64FDD08C2F73AAA9C91D7FA3E481943
                                          SHA-512:029A0531E7B687F35A4AB3A679FFFF45915066ACA236B2DB7AB6848509C9933B949C09AFA9C6CEE0B8813B81D98ABC6C40CABDB22C24122EFB3E3B4D594EF997
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/uploads/cropped-Sabrent-Website-Favicon.png
                                          Preview:.PNG........IHDR..............x....T.IDATx...yx[.}....N,....wJ$%j.,Y.e...i.8...I...d.L...6O.>}..L;I.i.4m.:I......M.,..E...}'A. .....R...n..$.~^..[.|.%...=...................................................................`.........w.5@.e......?..l.e..$.98...x.G..$.K.(...v..,...... ... ....z.........O.a..*.....Wf...:t..........2U.W75..L....F4.K.0...,..].2.....A'.T...A2............2*.,.].v....*`/p...?...7..s.u...).C..u........$..I....l.....6...%.i.0.T&..y............6.&.^U...#..t....!ia.."~...l..h.O.Us..7....O.......p.....g?....o..2;]%.(:....aN..... ...f...|..\.X......?.J&...w.....J...K.lz.#...{....?.g..Eb*.,*..........$s.........*./zM..L*.|._$.L....'.............!.B..e.|..l.....*..$.....d...D3....n......)`%h].b..Oq.u....!...|..l...a5. .n.w.....d.....k.a,...%7..v.I&..p8.)......,.3.!.....YT.......ZY..?;.....L&?.L&m..Kk......y4...6..l..LWH..E...P.........Y.v4...-.d.cK5.,...+_...p....\....&ff....9.<H.(.....[.....Vj._.A...c.d....,r.]w.L
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
                                          Category:downloaded
                                          Size (bytes):15744
                                          Entropy (8bit):7.986588355476176
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:15D9F621C3BD1599F0169DCF0BD5E63E
                                          SHA1:7CA9C5967F3BB8BFFEAB24B639B49C1E7D03FA52
                                          SHA-256:F6734F8177112C0839B961F96D813FCB189D81B60E96C33278C1983B6F419615
                                          SHA-512:D35A47162FC160CD5F806C3BB7FEB50EC96FDFC81753660EAD22EF33F89BE6B1BFD63D1135F6B479D35C2E9D30F2360FFC8819EFCA672270E230635BCB206C82
                                          Malicious:false
                                          Reputation:low
                                          URL:https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Mu4mxK.woff2
                                          Preview:wOF2......=........t..=..........................d..d..^.`.. .T..<.....|..{........6.$.... ..t. ..I.3.%.....8..&....4Z.|t .8.........D...$.uNE.P.E.Ak...=.x.9Xz.`.I..R....#F+B`..}.RP|E...Z\.W[.............C...QB....m...cm.?.F.g.......Q....3......p...L2.[......!+@U..^~.......D.?.......j...U...c..U.l.6{...m.CD].h.t.....Q8.....@P...L.c.....+...ZD..2.K...:..4{g..:..~....v......<..H^.R.'....8....?.;...uy.VW..8=.".F..*.....@E....c....=..Ib.....y8$.a){.......KiIW.&..~.}..1..w.M..{.4......!..{..F.H.5#K...t..5.w...ve;. '......NJ......'(%;...?...D...M.Cq,<.=?.f......._...V..bA.(..37..v....+.uY.C.b.w8AF..3.n.-..'..U%.2....o.l."...^bj..aoF.!`....A....j...'.:Z.u...[..p.GW:U%.Ejq...:I...C........S.C...sJe.6D...<.UM,..&h..z}.y|..9...D..j...n..B.$..T....?../.Q..=B...C._.f.#.:Bo.@]T.(..v..F..+d...". ......R..R..R....!..~A....X............>!`p..,08. 9.../.....r..Q.......Qpg.\ko...C..3..Y.y..t'.d9..>#|..3..?.#..$....i........g5.z....S....{3..Sp..S2..w.6........
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (37022), with no line terminators
                                          Category:downloaded
                                          Size (bytes):37022
                                          Entropy (8bit):5.100767032361006
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:387659B8795D2CDC30C108DFC3639538
                                          SHA1:45E378A3DC72A63B5C32E097669AADDA72FE04A0
                                          SHA-256:8671F9515B125DAC51F563184DCE3184806F6E31241EFE7430C02BA34E0DFA1F
                                          SHA-512:3F49C677722C4176663BBAB18FE6233DF81432D9CB7673DFCD72474D76A6C7389C3408448B7C5EEA97EF2B038EE21F649E8E17690B2376430F7CE7635A641F67
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/css/front.css?ver=6.4.3
                                          Preview:.w3eden .hide_empty:empty{display:none}.w3eden ul.wpdm-pagination{margin:0!important;padding:15px;display:inline-flex!important}.w3eden .list-group-item img,.w3eden .card img{padding:0;margin:0}.wpdm-clear,.w3eden .clear{clear:both}.w3eden .no-radius{border-radius:0!important}.w3eden .btn.wpdm-category{border:0;border-bottom:0 solid #ccc}.w3eden .table th a{font-weight:700}.w3eden .btn.wpdm-front h3.title{margin:10px 0 5px 10px;font-size:14pt}.w3eden .ellipsis{white-space:nowrap;text-overflow:ellipsis;overflow:hidden;position:relative;width:100%;display:block}.w3eden .qdb{background:#0073ff;text-decoration:none;color:#fff;padding:5px 7px;font-size:8pt;-webkit-border-radius:3px;-moz-border-radius:3px;border-radius:3px}.w3eden #loginform{margin-top:20px}.w3eden .btn.wpdm-category-list li{clear:both}.w3eden .btn.wpdm-category-list{list-style:none}.w3eden .download_link label{width:60px;display:block;font-size:10px}.w3eden .cat-page-tilte legend{padding-right:5px}.w3eden .wpdm-loading{-web
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (15977), with no line terminators
                                          Category:downloaded
                                          Size (bytes):15977
                                          Entropy (8bit):5.240497373312841
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:EE858E15DB40066634AE2D7C3959FBF0
                                          SHA1:82D919C1C636BBAD55AE555CE661F9C34A3A7CFC
                                          SHA-256:DC869996CBC8F47CAB9AEB9523F81A7F420207A2601CCE9BA45E9B7E0E261452
                                          SHA-512:740CA0251429D605D84E91AF1F06B496B7653CB9D0B3847F03B0BAFDD1FAC848DF2B98F0E6E82F743659997E9EE40FA398B1BE87B093A9A33C9703D71910822E
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-includes/js/jquery/jquery.form.min.js?ver=4.3.0
                                          Preview:!function(a){"function"==typeof define&&define.amd?define(["jquery"],a):"object"==typeof module&&module.exports?module.exports=function(e,t){return void 0===t&&(t="undefined"!=typeof window?require("jquery"):require("jquery")(e)),a(t),t}:a(jQuery)}(function(O){"use strict";var d=/\r?\n/g,h={},X=(h.fileapi=void 0!==O('<input type="file">').get(0).files,h.formdata=void 0!==window.FormData,!!O.fn.prop);function o(e){var t=e.data;e.isDefaultPrevented()||(e.preventDefault(),O(e.target).closest("form").ajaxSubmit(t))}function i(e){var t=e.target,a=O(t);if(!a.is("[type=submit],[type=image]")){var r=a.closest("[type=submit]");if(0===r.length)return;t=r[0]}var n=t.form;"image"===(n.clk=t).type&&(void 0!==e.offsetX?(n.clk_x=e.offsetX,n.clk_y=e.offsetY):"function"==typeof O.fn.offset?(r=a.offset(),n.clk_x=e.pageX-r.left,n.clk_y=e.pageY-r.top):(n.clk_x=e.pageX-t.offsetLeft,n.clk_y=e.pageY-t.offsetTop)),setTimeout(function(){n.clk=n.clk_x=n.clk_y=null},100)}function C(){var e;O.fn.ajaxSubmit.debug&
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (540), with CRLF line terminators
                                          Category:downloaded
                                          Size (bytes):33872
                                          Entropy (8bit):5.1945259060358575
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:921B977AD3E092091607B8EE8070E9C7
                                          SHA1:74F29302329383A31DC31FF09C1FECC6A17B17FB
                                          SHA-256:4A4D5BAF9699DC0632041A6CF261857FA66663FBDB270CDF750D0869CF94CB94
                                          SHA-512:3E5717FBEE034163CAC5F333DF03582B0107CF816444C4958F7A2F4A9E1AE47ABFC8356CCB7F6DB268479FDFEFAAA88D3715A73BD8A3A2F44A67A8577CA76C2F
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/grid.css?ver=2.6.8
                                          Preview:/* Grid - Table of Contents..---------------------------------------------------------------.. .. #WPBakery Page Builder - Override default styles (when enabled)...#Grid...#Block grid.....-------------------------------------------------------------------- */....../* #WPBakery Page Builder - Override default styles (when enabled)..-------------------------------------------------------------------- */.....nm-wpb-default .vc_row {...margin-right: auto;.. margin-left: auto;..}...nm-wpb-default .vc_column_container {.. padding-right: 15px;...padding-left: 15px;..}...nm-wpb-default .vc_column_container > .vc_column-inner {...padding-left: 0;...padding-right: 0;..}../* Front-end editor */...vc_element > .nm_column {.. width: 100%;..}....../* #Grid..-------------------------------------------------------------------- */..../* Row */...nm-row:before, .nm-row:after {...display: table;.. content: " ";..}...nm-row:after {.. clear: both;..}...nm-row {.. max-width: 1280px;.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (6946), with no line terminators
                                          Category:downloaded
                                          Size (bytes):6946
                                          Entropy (8bit):4.602515852121979
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F28A9474DA68FF27DA4CD527665EDCFC
                                          SHA1:1651A649A1B1AC432D642D0C79A651DE23A97DCC
                                          SHA-256:72E2BC6E5DBC70596FF7DE110E762BA494D3D87ACF999EBB0E5E12ADFE86611B
                                          SHA-512:2E3676962A3A3CBA2952E5AF6939DDC6D114FFEC7E2407898318A775161EBAC82BA6CC4AAEF1AB7615D7F032E3E54CFB065057A8CA9D310AAC2DAC9558323EA3
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/font-icons/theme-icons/theme-icons.min.css?ver=2.6.8
                                          Preview:@font-face{font-family:nm-font;src:url(fonts/nm-font.ttf?foguo0) format('truetype'),url(fonts/nm-font.woff?foguo0) format('woff'),url(fonts/nm-font.svg?foguo0#nm-font) format('svg');font-weight:400;font-style:normal;font-display:block}[class*=" nm-font-"],[class^=nm-font-]{font-family:nm-font!important;speak:never;font-style:normal;font-weight:400;font-variant:normal;text-transform:none;line-height:1;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.nm-font-info-outline:before{content:"\e912"}.nm-font-info:before{content:"\e913"}.nm-font-filter-list:before{content:"\e90d"}.nm-font-location:before{content:"\e90a"}.nm-font-tagged:before{content:"\e90e"}.nm-font-users:before{content:"\e90b"}.nm-font-menu:before{content:"\e906"}.nm-font-heart-outline:before{content:"\e902"}.nm-font-search:before{content:"\e903"}.nm-font-cart:before{content:"\e904"}.nm-font-single-user:before{content:"\e905"}.nm-font-eye:before{content:"\e000"}.nm-font-search-alt:before{content:"\e036"}.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (58274), with no line terminators
                                          Category:downloaded
                                          Size (bytes):58274
                                          Entropy (8bit):5.041598675190248
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:6922E2FF3E8E46C7BFB51DC30455AC3D
                                          SHA1:1ED619F36D219AFB529B82D3F93E573D92A98FFC
                                          SHA-256:99C21D0245FF09BE92C0CA4C39ED1927EFC3931EE22341C10B748529B90ED323
                                          SHA-512:8C9045E1D19EB8128FAAF52435540582D3F8F1FB6CC99232F84DE85C2B1D298A5EFDE3E9B84B11AFD2224E6161FD568296C2299A65CA2B42B080D71CB1DDA59A
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/bootstrap/css/bootstrap.min.css?ver=6.4.3
                                          Preview:@-webkit-keyframes spinner-border{to{-webkit-transform:rotate(360deg);transform:rotate(360deg)}}@keyframes spinner-border{to{-webkit-transform:rotate(360deg);transform:rotate(360deg)}}@-webkit-keyframes spinner-grow{0%{-webkit-transform:scale(0);transform:scale(0)}50%{opacity:1}}@keyframes spinner-grow{0%{-webkit-transform:scale(0);transform:scale(0)}50%{opacity:1}}:root{--font-size-lg:16px;--font-size-sm:12px;--border-radius-regular:3px;--border-radius-sm:2px;--padding-regular:5px 15px}.w3eden *,.w3eden ::after,.w3eden ::before{box-sizing:border-box}.w3eden html{font-family:sans-serif;line-height:1.15;-webkit-text-size-adjust:100%;-webkit-tap-highlight-color:transparent}.w3eden article,.w3eden aside,.w3eden figcaption,.w3eden figure,.w3eden footer,.w3eden header,.w3eden hgroup,.w3eden main,.w3eden nav,.w3eden section{display:block}.w3eden body{margin:0;font-family:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans",sans-serif,"Apple Color Emoji","Sego
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (13479)
                                          Category:downloaded
                                          Size (bytes):13577
                                          Entropy (8bit):5.272065782731947
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:9FFEB32E2D9EFBF8F70CAABDED242267
                                          SHA1:3AD0C10E501AC2A9BFA18F9CD7E700219B378738
                                          SHA-256:5274F11E6FB32AE0CF2DFB9F8043272865C397A7C4223B4CFA7D50EA52FBDE89
                                          SHA-512:8D6BE545508A1C38278B8AD780C3758AE48A25E4E12EEE443375AA56031D9B356F8C90F22D4F251140FA3F65603AF40523165E33CAE2E2D62FC78EC106E3D731
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                                          Preview:/*! jQuery Migrate v3.4.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */."undefined"==typeof jQuery.migrateMute&&(jQuery.migrateMute=!0),function(t){"use strict";"function"==typeof define&&define.amd?define(["jquery"],function(e){return t(e,window)}):"object"==typeof module&&module.exports?module.exports=t(require("jquery"),window):t(jQuery,window)}(function(s,n){"use strict";function e(e){return 0<=function(e,t){for(var r=/^(\d+)\.(\d+)\.(\d+)/,n=r.exec(e)||[],o=r.exec(t)||[],a=1;a<=3;a++){if(+o[a]<+n[a])return 1;if(+n[a]<+o[a])return-1}return 0}(s.fn.jquery,e)}s.migrateVersion="3.4.1";var t=Object.create(null);s.migrateDisablePatches=function(){for(var e=0;e<arguments.length;e++)t[arguments[e]]=!0},s.migrateEnablePatches=function(){for(var e=0;e<arguments.length;e++)delete t[arguments[e]]},s.migrateIsPatchEnabled=function(e){return!t[e]},n.console&&n.console.log&&(s&&e("3.0.0")&&!e("5.0.0")||n.console.log("JQMIGRATE: jQuery 3.x-4.x REQUIRED"),s.migrateWarnings
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:HTML document, Unicode text, UTF-8 text, with very long lines (21184), with CRLF, LF line terminators
                                          Category:downloaded
                                          Size (bytes):55410
                                          Entropy (8bit):5.277794543641715
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:D4555B32985A9594316C01106B5EDF9A
                                          SHA1:2BE119BF8B247372F2EC656A6875BC568394B7D1
                                          SHA-256:6C38DFC968E5D57F2B8AC4997A6FA06A78ACC8F78E9B9988434362E31060504E
                                          SHA-512:BF163A7BD8C35CAAC5B63BEA3441180B745AA2EC4A6A90FEE1DE4E666EDCAE9831ABE86C86785B641E05BE510E71076A29D46613B934C343ADE4140E115F604E
                                          Malicious:false
                                          Reputation:low
                                          URL:https://downloads.sabrent.com/product/hb-b7c3-firmware-update/
                                          Preview:..<!DOCTYPE html>.<html lang="en-US" class="footer-sticky-0">.<head>.<meta charset="UTF-8">.<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">.<title>HB-B7C3 . Firmware Update &#8211; Sabrent Downloads</title>.<meta name="robots" content="max-image-preview:large" />.<script src="/cdn-cgi/apps/head/7Urk1JmloTAnH96Ql77qNavbYV0.js"></script><link rel="dns-prefetch" href="//use.fontawesome.com" />.<link rel="dns-prefetch" href="//fonts.googleapis.com" />.<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin />.<link rel="alternate" type="application/rss+xml" title="Sabrent Downloads &raquo; Feed" href="https://downloads.sabrent.com/feed/" />.<link rel="alternate" type="application/rss+xml" title="Sabrent Downloads &raquo; Comments Feed" href="https://downloads.sabrent.com/comments/feed/" />.<script type="f7f89150a1662993e1651525-text/javascript">./* <![CDATA[ */.window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (12331)
                                          Category:downloaded
                                          Size (bytes):12332
                                          Entropy (8bit):5.0916439525688215
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:88A769D2FE35899FD45A332A0A032CC0
                                          SHA1:514C6C1D8475D17E412849A4C90159517D0FA10A
                                          SHA-256:CCF00D1923B0131A10E0C6D26F95E5DEE6EBF8621A27E83C5A2F68A2E0093142
                                          SHA-512:756CC5CD029FC4ADC9100D0DA2F2B0EFB3DF0F2BF894FBA2824019832FEA594EDD40A238A5FFACC205572CC0155F5632D70F54E37EDC0772460F44C69CB76AB8
                                          Malicious:false
                                          Reputation:low
                                          URL:https://downloads.sabrent.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js
                                          Preview:!function(){"use strict";function t(){return"cf-marker-"+Math.random().toString().slice(2)}function e(){for(var t=[],e=0;e<arguments.length;e++)t[e]=arguments[e];(n=console.warn||console.log).call.apply(n,[console,"[ROCKET LOADER] "].concat(t));var n}function n(t,e){var n=e.parentNode;n&&h(t,n,e)}function r(t,e){h(t,e,e.childNodes[0])}function o(t){var e=t.parentNode;e&&e.removeChild(t)}function i(t){var e=t.namespaceURI===A?"xlink:href":"src";return t.getAttribute(e)}function a(t,e){var n=t.type.substr(e.length);return!(n&&!E[n.trim()])&&((!k||!t.hasAttribute("nomodule"))&&!(!k&&"module"===n))}function c(t){return a(t,"")}function s(t,e){return function(n){if(e(),t)return t.call(this,n)}}function u(t,e){t.onload=s(t.onload,e),t.onerror=s(t.onerror,e)}function p(t){var e=document.createElementNS(t.namespaceURI,"script");e.async=t.hasAttribute("async"),e.textContent=t.textContent;for(var n=0;n<t.attributes.length;n++){var r=t.attributes[n];try{r.namespaceURI?e.setAttributeNS(r.namespace
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (32178)
                                          Category:downloaded
                                          Size (bytes):36593
                                          Entropy (8bit):5.155116411556708
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:F75E5735AE8FE0F1E033E9205D2523F5
                                          SHA1:DABE28F2695A445BE9E1B6A6DB2B016B84FB3AAD
                                          SHA-256:21B8A788BE3B5750A416DB298F10052985F72DF78861746B134D8537DBDF341A
                                          SHA-512:2EF0812278175394D9EE5CADE60E605A93EF934F6AB774A235AC122B2BE5F290F5E9997644F454B0A5C0E37ED5279A2366627598BE0C677F670C1B2B62767C3B
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/plugins/slick.min.js?ver=1.5.5
                                          Preview:/* slick.js - version: 1.5.5 - author: Ken Wheeler */.!function(a){"use strict";"function"==typeof define&&define.amd?define(["jquery"],a):"undefined"!=typeof exports?module.exports=a(require("jquery")):a(jQuery)}(function(a){"use strict";var b=window.Slick||{};b=function(){function c(c,d){var f,g,h,e=this;if(e.defaults={accessibility:!0,adaptiveHeight:!1,appendArrows:a(c),appendDots:a(c),arrows:!0,asNavFor:null,prevArrow:'<button type="button" data-role="none" class="slick-prev" aria-label="previous">Previous</button>',nextArrow:'<button type="button" data-role="none" class="slick-next" aria-label="next">Next</button>',autoplay:!1,autoplaySpeed:3e3,centerMode:!1,centerPadding:"50px",cssEase:"ease",customPaging:function(a,b){return'<button type="button" data-role="none">'+(b+1)+"</button>"},dots:!1,dotsClass:"slick-dots",draggable:!0,easing:"linear",edgeFriction:.35,fade:!1,focusOnSelect:!1,infinite:!0,initialSlide:0,lazyLoad:"ondemand",mobileFirst:!1,pauseOnHover:!0,pauseOnDotsHover:!
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (15441), with no line terminators
                                          Category:downloaded
                                          Size (bytes):15441
                                          Entropy (8bit):5.080339557919134
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:B9BB4D997ABC7258C3D8CF94D7AF604F
                                          SHA1:41DC2DB4BA7F8CB897E0C30C7D246E98DAD0A70E
                                          SHA-256:16C8DE590F739B310A5D8BA944E1C61121DC11A41C0178ACC94F87623CE12CCD
                                          SHA-512:4C22EC99E5C30B7D5A3CAF63C6CFEDD374EC91D864FA05A5BA001504BFB7B439F4906E5F6A71127765FB2C2B40D56052F454C1213EAE3C5316C05FFF798DE8AE
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/plugins/download-manager/assets/fancybox/fancybox.css
                                          Preview:.carousel{position:relative;box-sizing:border-box}.carousel *,.carousel *:before,.carousel *:after{box-sizing:inherit}.carousel.is-draggable{cursor:move;cursor:grab}.carousel.is-dragging{cursor:move;cursor:grabbing}.carousel__viewport{position:relative;overflow:hidden;max-width:100%;max-height:100%}.carousel__track{display:flex}.carousel__slide{flex:0 0 auto;width:var(--carousel-slide-width,60%);max-width:100%;padding:1rem;position:relative;overflow-x:hidden;overflow-y:auto;overscroll-behavior:contain}.has-dots{margin-bottom:calc(0.5rem + 22px)}.carousel__dots{margin:0 auto;padding:0;position:absolute;top:calc(100% + 0.5rem);left:0;right:0;display:flex;justify-content:center;list-style:none;user-select:none}.carousel__dots .carousel__dot{margin:0;padding:0;display:block;position:relative;width:22px;height:22px;cursor:pointer}.carousel__dots .carousel__dot:after{content:"";width:8px;height:8px;border-radius:50%;position:absolute;top:50%;left:50%;transform:translate(-50%,-50%);background
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (65447)
                                          Category:downloaded
                                          Size (bytes):87553
                                          Entropy (8bit):5.262620498676155
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:826EB77E86B02AB7724FE3D0141FF87C
                                          SHA1:79CD3587D565AFE290076A8D36C31C305A573D18
                                          SHA-256:CB6F2D32C49D1C2B25E9FFC9AAAFA3F83075346C01BCD4AE6EB187392A4292CF
                                          SHA-512:FC79FDB76763025DC39FAC045A215FF155EF2F492A0E9640079D6F089FA6218AF2B3AB7C6EAF636827DEE9294E6939A95AB24554E870C976679C25567AD6374C
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                                          Preview:/*! jQuery v3.7.1 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(ie,e){"use strict";var oe=[],r=Object.getPrototypeOf,ae=oe.slice,g=oe.flat?function(e){return oe.flat.call(e)}:function(e){return oe.concat.apply([],e)},s=oe.push,se=oe.indexOf,n={},i=n.toString,ue=n.hasOwnProperty,o=ue.toString,a=o.call(Object),le={},v=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},y=function(e){return null!=e&&e===e.window},C=ie.document,u={type:!0,src:!0,nonce:!0,noModule:!0};function m(e,t,n){var r,i,o=(n=n||C).createElement("script");if(o.text=e,t)for(r in u)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.remove
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:PNG image data, 32 x 32, 8-bit colormap, non-interlaced
                                          Category:dropped
                                          Size (bytes):1246
                                          Entropy (8bit):7.446425706408003
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:C60C26AE22358BCB65A41634C2003A8F
                                          SHA1:A66AAA73962972B1AAF4FB54A4AA1D63140EA901
                                          SHA-256:D6AFF1BA4C5049189F303F96C4E2107461A53A2548BECF01726BF974681F03FE
                                          SHA-512:A619FCD44A973122E34144BA374AC9530078CDC0B0A1F058AF01570C647B1D55C131D217225F60856230B6C57923FC579C153E6F62E42E04CD6709A7918D3E62
                                          Malicious:false
                                          Reputation:low
                                          Preview:.PNG........IHDR... ... .....D......LPLTE.......]..............]..........K...]..............................m..V..P..$k."j..^..].....].......................]..............].............&l..]..........*o..................................c..L..)n..g..a..]........].............................................................................................................................................................................}..z..r..p..n..m..j..j..e..e..d..[..X..S..L..K..G..G..C..B..@~.=|.<{.9y.7x.6w.5v.3u.0s.-q.,p.*o.'m.!i. i..h..g..f..f..e..d..c..c..b..b..a.._.._..^..^..^..]..]........LtRNS..............."##############$$+5>EPi......................................zQ......IDATx.c`````..........!...~^...`U.2....s..7G.+++.cME..VUO..(.v......@...3....D>z.T~s.L...\...U...............|&`V.R....@$y.]...K.#j.!.....dy.=N..+.....`.eE~>...7l.I.....MAD.&....i..`..)........E.......>..,....iw..k.R}}.+..8.maON.......].q.>>8....(..O...@.u..i.U...8.
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (21014)
                                          Category:downloaded
                                          Size (bytes):21143
                                          Entropy (8bit):5.348142154243176
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:BE3333626C57AF03599ABCB59B325E09
                                          SHA1:3824067348F6485D6B07D3A43660804E3731B21A
                                          SHA-256:ECBEF0F33E8CCEDD2C605816E052CFFF778ABCC0E30A80B874C097A5FDDD24FC
                                          SHA-512:5ED1A4755CFF703C4D3688CAFB9491D8BF0DBFE5F64D2EB7AFC933A6C59A2D17B452295AC2BBF96035967BA4B0B9D655E7A2C2D61339B83C35F900D714B89120
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/js/plugins/jquery.magnific-popup.min.js?ver=0.9.9
                                          Preview:/*! Magnific Popup - v1.0.0 - 2015-01-03.* http://dimsemenov.com/plugins/magnific-popup/.* Copyright (c) 2015 Dmitry Semenov; */.!function(a){"function"==typeof define&&define.amd?define(["jquery"],a):a("object"==typeof exports?require("jquery"):window.jQuery||window.Zepto)}(function(a){var b,c,d,e,f,g,h="Close",i="BeforeClose",j="AfterClose",k="BeforeAppend",l="MarkupParse",m="Open",n="Change",o="mfp",p="."+o,q="mfp-ready",r="mfp-removing",s="mfp-prevent-close",t=function(){},u=!!window.jQuery,v=a(window),w=function(a,c){b.ev.on(o+a+p,c)},x=function(b,c,d,e){var f=document.createElement("div");return f.className="mfp-"+b,d&&(f.innerHTML=d),e?c&&c.appendChild(f):(f=a(f),c&&f.appendTo(c)),f},y=function(c,d){b.ev.triggerHandler(o+c,d),b.st.callbacks&&(c=c.charAt(0).toLowerCase()+c.slice(1),b.st.callbacks[c]&&b.st.callbacks[c].apply(b,a.isArray(d)?d:[d]))},z=function(c){return c===g&&b.currTemplate.closeBtn||(b.currTemplate.closeBtn=a(b.st.closeMarkup.replace("%title%",b.st.tClose)),g=c),
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (48199), with no line terminators
                                          Category:downloaded
                                          Size (bytes):48199
                                          Entropy (8bit):4.932930263620696
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:89748FD24CBA61C6ED94C989001484AB
                                          SHA1:89BDD993DAE565D873AA8545A06A04BBAB37AF8E
                                          SHA-256:5C4775724D3319E3A73078FD92B5BEE46A4583FB58EBDB70B5B53B8451355C34
                                          SHA-512:5E6E6788594FB4D4B256FD626ACC00F2B438CF2118F8EC4E79348279DE9E15FC7D1E3854C7C2F364579CC338D93D891D40BD0FC2667D07315831FF33DF2D4006
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-content/themes/savoy/assets/css/elements.css?ver=2.6.8
                                          Preview:.wpb_row,.wpb_content_element,ul.wpb_thumbnails-fluid>li,.wpb_button{margin-bottom:0}.nm-elementor-tabs:before,.nm-elementor-tabs:after{display:table;content:" "}.nm-elementor-tabs:after{clear:both}.nm-elementor-tabs-vertical .nm-elementor-tabs{display:-webkit-box;display:-ms-flexbox;display:flex}.nm-elementor-tabs-wrapper{position:relative;z-index:1}.nm-elementor-tabs-align-center .nm-elementor-tabs-wrapper{text-align:center}.nm-elementor-tabs-align-right .nm-elementor-tabs-wrapper{text-align:right}.nm-elementor-tab a{display:block;position:relative;font-size:18px;line-height:1.4;color:#a0a0a0;border-bottom:1px solid transparent}.nm-elementor-tab.nm-elementor-active a{color:#282828;border-color:#e1e1e1;cursor:default}.nm-elementor-tabs-horizontal .nm-elementor-tabs-wrapper{padding-bottom:27px}.nm-elementor-tabs-horizontal .nm-elementor-tab{display:inline-block}.nm-elementor-tabs-horizontal .nm-elementor-tab a{margin:0 14px;padding:0 0 5px}.nm-elementor-tabs-horizontal .nm-elementor-ta
                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                          File Type:ASCII text, with very long lines (57196)
                                          Category:downloaded
                                          Size (bytes):110147
                                          Entropy (8bit):4.920389651812489
                                          Encrypted:false
                                          SSDEEP:
                                          MD5:0234D0A7685AEFA6FD06041FBD602928
                                          SHA1:CBCBA60AA82286DD1F877CB8BD5B5CC047F82CE0
                                          SHA-256:0085ADFD2D08A45F62A06D8F3F969DDC4A94EBE8D226511DB90AA038F11ED180
                                          SHA-512:298B4324851F0D9662A48EF2FA74E65CD78FB4BC69191B05E70C254B6CC196719E7F35FE3E882857026FCFA260F0A5B1208E964EE9F42A9DD2E2FED0ACB070D1
                                          Malicious:false
                                          Reputation:low
                                          URL:https://s39916.pcdn.co/wp-includes/css/dist/block-library/style.min.css?ver=6.4.3
                                          Preview:@charset "UTF-8";.wp-block-archives{box-sizing:border-box}.wp-block-archives-dropdown label{display:block}.wp-block-avatar{line-height:0}.wp-block-avatar,.wp-block-avatar img{box-sizing:border-box}.wp-block-avatar.aligncenter{text-align:center}.wp-block-audio{box-sizing:border-box}.wp-block-audio figcaption{margin-bottom:1em;margin-top:.5em}.wp-block-audio audio{min-width:300px;width:100%}.wp-block-button__link{box-sizing:border-box;cursor:pointer;display:inline-block;text-align:center;word-break:break-word}.wp-block-button__link.aligncenter{text-align:center}.wp-block-button__link.alignright{text-align:right}:where(.wp-block-button__link){border-radius:9999px;box-shadow:none;padding:calc(.667em + 2px) calc(1.333em + 2px);text-decoration:none}.wp-block-button[style*=text-decoration] .wp-block-button__link{text-decoration:inherit}.wp-block-buttons>.wp-block-button.has-custom-width{max-width:none}.wp-block-buttons>.wp-block-button.has-custom-width .wp-block-button__link{width:100%}.wp-bl
                                          No static file info